A Mutation Approach of Detecting SQL Injection Vulnerabilities

被引:5
|
作者
Huang, Yanyu [1 ]
Fu, Chuan [1 ]
Chen, Xuan [1 ]
Guo, Hao [1 ]
He, Xiaoyu [1 ]
Li, Jin [1 ]
Liu, Zheli [1 ]
机构
[1] Nankai Univ, Tianjin, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Vulnerability; Test generation; Mutation operators; ATTACKS;
D O I
10.1007/978-3-319-68542-7_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As Internet is increasingly prosperous, Web services become more common in our social life. As users can access pages on the Web directly, Web application plays a vital role in various domains such as e-finance and public-services. Inevitably, it will be followed by unprecedented amount of attacks and exploitations. Amongst all of those attacks, SQL injection attacks have consistently high rank in last years due to corresponding vulnerabilities. It is crucial to checking this vulnerabilities before web services being public. In our paper we present an effective approach for testing, MOSA, and mutation operators set to its underpinning. Using this approach we can produce test inputs that cause executable and malignant SQL statement efficiently. Besides that, we do numerous experiments and the results demonstrate that the mutation approach can detect SQL injection vulnerabilities and generate inputs that bypass web application firewalls.
引用
收藏
页码:175 / 188
页数:14
相关论文
共 50 条
  • [1] Detecting SQL Injection Vulnerabilities in Web Services
    Antunes, Nuno
    Vieira, Marco
    LADC: 2009 4TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING, 2009, : 17 - 24
  • [2] A Rejection-Based Approach for Detecting SQL Injection Vulnerabilities in Web Applications
    Saoudi, Lalia
    Adi, Kamel
    Boudraa, Younes
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2019, 2020, 12056 : 379 - 386
  • [3] A static analysis framework for detecting SQL injection vulnerabilities
    Fu, Xiang
    Lu, Xin
    Peltsverger, Boris
    Chen, Shijun
    Qian, Kai
    Tao, Lixin
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL I, PROCEEDINGS, 2007, : 87 - +
  • [4] An Improved Approach for SQL Injection Vulnerabilities Detection
    Zhang, Zongzhi
    Wen, Qiaoyan
    Zhang, Zhao
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 3017 - 3020
  • [5] Security Testing of Web Applications: A Search-Based Approach for Detecting SQL Injection Vulnerabilities
    Liu, Muyang
    Li, Ke
    Chen, Tao
    PROCEEDINGS OF THE 2019 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION (GECCCO'19 COMPANION), 2019, : 417 - 418
  • [6] Customizing OWASP ZAP: A Proven Method for Detecting SQL Injection Vulnerabilities
    Alazmi, Suliman
    de Leon, Daniel Conte
    2023 IEEE 9TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD, BIGDATASECURITY, IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, HPSC AND IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY, IDS, 2023, : 102 - 106
  • [7] Detecting SQL Injection Vulnerabilities Using Nature-inspired Algorithms
    Baptista, Kevin
    Bernardino, Anabela Moreira
    Bernardino, Eugenia Moreira
    COMPUTATIONAL SCIENCE, ICCS 2022, PT IV, 2022, : 451 - 457
  • [8] A Machine Learning based Approach to Identify SQL Injection Vulnerabilities
    Zhang, Kevin
    34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2019), 2019, : 1286 - 1288
  • [9] Detecting Various SQL Injection Vulnerabilities using String Matching and LCS Method
    Anitha, V
    Lakshmi, Supha A.
    Revathi, M.
    Selvi, K.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 237 - 241
  • [10] Understanding and Discovering SQL Injection Vulnerabilities
    Sarhan, Abdullaziz A.
    Farhan, Shehab A.
    Al-Harby, Fahad M.
    ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2018, 593 : 45 - 51