SQLIFIX: Learning Based Approach to Fix SQL Injection Vulnerabilities in Source Code

被引:2
|
作者
Siddiq, Mohammed Latif [1 ]
Jahin, Md Rezwanur Rahman [1 ]
Ul Islam, Mohammad Rafid [1 ]
Shahriyar, Rifat [1 ]
Iqbal, Anindya [1 ]
机构
[1] Bangladesh Univ Engn & Technol, Dhaka, Bangladesh
关键词
SQL Injection; Prepared Statement; Automatic Fix;
D O I
10.1109/SANER50967.2021.00040
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
SQL Injection attack is one of the oldest yet effective attacks for web applications. Even in 2020, applications are vulnerable to SQL Injection attacks. The developers are supposed to take precautions such as parameterizing SQL queries, escaping special characters, etc. However, developers, especially inexperienced ones, often fail to comply with such guidelines. There are quite a few SQL Injection detection tools to expose any unattended SQL Injection vulnerability in source code. However, to the best of our knowledge, very few works have been done to suggest a fix of these vulnerabilities in the source code. We have developed a learning-based approach that prepares abstraction of SQL Injection vulnerable codes from training dataset and clusters them using hierarchical clustering. The test samples are matched with a cluster of similar samples and a fix suggestion is generated. We have developed a manually validated training and test dataset from real-world projects of Java and PHP to evaluate our language-agnostic approach. The results establish the superiority of our technique over comparable techniques. The code and dataset are released publicly to encourage reproduction.
引用
收藏
页码:354 / 364
页数:11
相关论文
共 50 条
  • [21] SQL Injection Behavior Mining Based Deep Learning
    Tang, Peng
    Qiu, Weidong
    Huang, Zheng
    Lian, Huijuan
    Liu, Guozhen
    ADVANCED DATA MINING AND APPLICATIONS, ADMA 2018, 2018, 11323 : 445 - 454
  • [22] Detecting Source Code Vulnerabilities using High-Precision Code Representation and Bimodal Contrastive Learning
    Wang, Jie
    Xu, Mengru
    Chen, Hao
    2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 536 - 541
  • [23] A Deep Learning Approach for QR Code Based Printed Source Identification
    Tsai, Min-Jen
    Chen, Te-Ming
    2021 15TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2021,
  • [24] SQL-IDS: A Specification-based Approach for SQL-Injection Detection
    Kemalis, Konstantinos
    Tzouramanis, Theodoros
    APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 2153 - 2158
  • [25] Detecting code vulnerabilities by learning from large-scale open source repositories
    Xu, Rongze
    Tang, Zhanyong
    Ye, Guixin
    Wang, Huanting
    Ke, Xin
    Fang, Dingyi
    Wang, Zheng
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 69
  • [26] Research on SQL Injection Defense Technology Based on Deep Learning
    Shi, Weiyu
    Liu, Xiaoqian
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT II, 2022, 13339 : 538 - 549
  • [27] An Approach for SQL Injection Detection Based on Behavior and Response Analysis
    Xiao, Zeli
    Zhou, Zhiguo
    Yang, Wenwei
    Deng, Chunyan
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 1437 - 1442
  • [28] Token based Detection and Neural Network based Reconstruction framework against code injection vulnerabilities
    George, Teresa K.
    Jacob, K. Poulose
    James, Rekha K.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 : 75 - 91
  • [29] A learning-based approach to the detection of SQL attacks
    Valeur, F
    Mutz, D
    Vigna, G
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2005, 3548 : 123 - 140
  • [30] A Semantic Learning-Based SQL Injection Attack Detection Technology
    Lu, Dongzhe
    Fei, Jinlong
    Liu, Long
    ELECTRONICS, 2023, 12 (06)