A Static Detection Method for SQL Injection Vulnerability Based on Program Transformation

被引:2
|
作者
Yuan, Ye [1 ,2 ]
Lu, Yuliang [1 ,2 ]
Zhu, Kailong [1 ,2 ]
Huang, Hui [1 ,2 ]
Yu, Lu [1 ,2 ]
Zhao, Jiazhen [1 ,2 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230037, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awarene, Hefei 230037, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 21期
关键词
static analysis; object-oriented; database extensions; program transformation-based; detection of SQL injection vulnerabilities; WEB APPLICATION VULNERABILITIES;
D O I
10.3390/app132111763
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Static analysis is popular for detecting SQL injection vulnerabilities. However, due to the lack of accurate modeling of object-oriented database extensions, current methods fail to accurately detect SQL injection vulnerabilities in applications that use object-oriented database extensions. We propose a program transformation-based SQL injection vulnerability detection method to address this issue. This method consists of two stages: program transformation and vulnerability detection. In the first stage, object-oriented database extensions are automatically transformed into semantically equivalent procedural database extensions through the identification of key statements, call relation verification, and program transformation. In the second stage, application programs are automatically scanned using a combination of control flow graph construction and taint analysis techniques to detect SQL injection vulnerabilities. Based on the proposed method, we have implemented the OODBE-SCAN prototype system and performed experimental analysis on eight modern PHP applications. We compare OODBE-SCAN with two related static analysis tools, RIPS and Seay. The results show that OODBE-SCAN can detect more real-world vulnerabilities and has higher accuracy than existing methods.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] Network program vulnerability detection technology based on program modeling
    Deng Z.
    Lu Y.
    Huang Z.
    Huang H.
    Zhu K.
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2019, 45 (04): : 796 - 803
  • [42] A static analysis framework for detecting SQL injection vulnerabilities
    Fu, Xiang
    Lu, Xin
    Peltsverger, Boris
    Chen, Shijun
    Qian, Kai
    Tao, Lixin
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL I, PROCEEDINGS, 2007, : 87 - +
  • [43] Design and Implementation of an Automatic Scanning Tool of SQL Injection Vulnerability Based on Web Crawler
    Lei, Xiaochun
    Qu, Jiashi
    Yao, Gang
    Chen, Junyan
    Shen, Xin
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 481 - 488
  • [44] Research and Implementation of SQL Injection Prevention Method Based on ISR
    Chen Ping
    Wang Jinshuang
    Pan Lin
    Yu Han
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1153 - 1156
  • [45] CMM: A Combination-Based Mutation Method for SQL Injection
    Zhao, Jing
    Dong, Tianran
    Cheng, Yang
    Wang, Yanbin
    STRUCTURED OBJECT-ORIENTED FORMAL LANGUAGE AND METHOD (SOFL+MSVL 2019), 2020, 12028 : 345 - 361
  • [46] Detection and prevention of SQL injection attacks
    Halfond, William G. J.
    Orso, Alessandro
    MALWARE DETECTION, 2007, : 85 - +
  • [47] Hybrid SQL Injection Detection System
    Priyaa, B. Deva
    Devi, M. Indra
    2016 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2016,
  • [48] Discussion on the detection and prevention of SQL injection
    Zhang, Xingzhong
    Zhang, Xiaojie
    APPLICATIONS OF ENGINEERING MATERIALS, PTS 1-4, 2011, 287-290 : 3047 - 3050
  • [49] A Top Web Security Vulnerability SQL Injection attack - Survey
    Abirami, J.
    Devakunchari, R.
    Valliyammai, C.
    2015 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2015,
  • [50] SQL Injection Vulnerability General Patch Using Header Sanitization
    Sadeghian, Amirmohammad
    Zamani, Mazdak
    Manaf, Azizah Abd.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2014, : 239 - 243