A Static Detection Method for SQL Injection Vulnerability Based on Program Transformation

被引:2
|
作者
Yuan, Ye [1 ,2 ]
Lu, Yuliang [1 ,2 ]
Zhu, Kailong [1 ,2 ]
Huang, Hui [1 ,2 ]
Yu, Lu [1 ,2 ]
Zhao, Jiazhen [1 ,2 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230037, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awarene, Hefei 230037, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 21期
关键词
static analysis; object-oriented; database extensions; program transformation-based; detection of SQL injection vulnerabilities; WEB APPLICATION VULNERABILITIES;
D O I
10.3390/app132111763
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Static analysis is popular for detecting SQL injection vulnerabilities. However, due to the lack of accurate modeling of object-oriented database extensions, current methods fail to accurately detect SQL injection vulnerabilities in applications that use object-oriented database extensions. We propose a program transformation-based SQL injection vulnerability detection method to address this issue. This method consists of two stages: program transformation and vulnerability detection. In the first stage, object-oriented database extensions are automatically transformed into semantically equivalent procedural database extensions through the identification of key statements, call relation verification, and program transformation. In the second stage, application programs are automatically scanned using a combination of control flow graph construction and taint analysis techniques to detect SQL injection vulnerabilities. Based on the proposed method, we have implemented the OODBE-SCAN prototype system and performed experimental analysis on eight modern PHP applications. We compare OODBE-SCAN with two related static analysis tools, RIPS and Seay. The results show that OODBE-SCAN can detect more real-world vulnerabilities and has higher accuracy than existing methods.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] Design and Implementation of SQL Injection Vulnerability Scanning Tool
    Zhao, Juanjuan
    Liu, Changhua
    5TH ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2020), 2020, 1575
  • [32] Evaluating the Effectiveness of Conventional Fixes for SQL Injection Vulnerability
    Joseph, Swathy
    Jevitha, K. P.
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS, ICACNI 2015, VOL 2, 2016, 44 : 417 - 426
  • [33] Mutation Based SQL Injection Test Cases Generation for the Web Based Application Vulnerability Testing
    Ilies, Benikhlef
    Wang Chenghong
    Sangirov, Gulomjon
    Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016), 2016, 67 : 546 - 551
  • [34] An Approach for SQL Injection Detection Based on Behavior and Response Analysis
    Xiao, Zeli
    Zhou, Zhiguo
    Yang, Wenwei
    Deng, Chunyan
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 1437 - 1442
  • [35] SQL Injection Detection Technology Based on BiLSTM-ATTENTION
    Wen, Pengcheng
    He, Chengwan
    Xiong, Wei
    Liu, Jihui
    2021 4TH INTERNATIONAL CONFERENCE ON ROBOTICS, CONTROL AND AUTOMATION ENGINEERING (RCAE 2021), 2021, : 165 - 170
  • [36] SQL Injection Attack Detection Framework Based on HTTP Traffic
    Zhu, Zhongdong
    Jia, Shilin
    Li, Jishuai
    Qin, Sujuan
    Guo, Hui
    PROCEEDINGS OF ACM TURING AWARD CELEBRATION CONFERENCE, ACM TURC 2021, 2021, : 179 - 185
  • [37] A Reusable SQL Injection Detection Method for Java']Java Web Applications
    He, Chengwan
    He, Yue
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (06) : 2576 - 2590
  • [38] A static comprehensive analytical method for buffer overflow vulnerability detection
    Shao Bilin
    Yan Jiafen
    Bian Genqing
    Zhao Yu
    Song Dan
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ELECTRONIC TECHNOLOGY, 2016, 48 : 151 - 155
  • [39] Exposing SQL Injection Vulnerability through Penetration Test Based on Finite State Machine
    Liu, Lei
    Xu, Jing
    Guo, Chenkai
    Kang, Jiehui
    Xu, Sihan
    Zhang, Biao
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1171 - 1175
  • [40] An Effective Penetration Test Approach based on Feature Matrix for Exposing SQL Injection Vulnerability
    Liu, Lei
    Xu, Jing
    Yang, Hongji
    Guo, Chenkai
    Kang, Jiehui
    Xu, Sihan
    Zhang, Biao
    Si, Guannan
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, : 123 - 132