A Mutation Approach of Detecting SQL Injection Vulnerabilities

被引:5
|
作者
Huang, Yanyu [1 ]
Fu, Chuan [1 ]
Chen, Xuan [1 ]
Guo, Hao [1 ]
He, Xiaoyu [1 ]
Li, Jin [1 ]
Liu, Zheli [1 ]
机构
[1] Nankai Univ, Tianjin, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Vulnerability; Test generation; Mutation operators; ATTACKS;
D O I
10.1007/978-3-319-68542-7_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As Internet is increasingly prosperous, Web services become more common in our social life. As users can access pages on the Web directly, Web application plays a vital role in various domains such as e-finance and public-services. Inevitably, it will be followed by unprecedented amount of attacks and exploitations. Amongst all of those attacks, SQL injection attacks have consistently high rank in last years due to corresponding vulnerabilities. It is crucial to checking this vulnerabilities before web services being public. In our paper we present an effective approach for testing, MOSA, and mutation operators set to its underpinning. Using this approach we can produce test inputs that cause executable and malignant SQL statement efficiently. Besides that, we do numerous experiments and the results demonstrate that the mutation approach can detect SQL injection vulnerabilities and generate inputs that bypass web application firewalls.
引用
收藏
页码:175 / 188
页数:14
相关论文
共 50 条
  • [21] On automated prepared statement generation to remove SQL injection vulnerabilities
    Thomas, Stephen
    Williams, Laurie
    Xie, Tao
    INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (03) : 589 - 598
  • [22] Formal Analysis of Vulnerabilities of Web Applications Based on SQL Injection
    De Meo, Federico
    Rocchetto, Marco
    Vigano, Luca
    SECURITY AND TRUST MANAGEMENT, STM 2016, 2016, 9871 : 179 - 195
  • [23] Test SQL Injection Vulnerabilities in Web Applications Based on Structure Matching
    Wu, Haiyan
    Gao, Guozhu
    Miao, Chunyu
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 935 - 938
  • [24] APPLICATION TO EXAMINE SQL INJECTION VULNERABILITIES AS A TOOL IN COMPUTER SCIENCE EDUCATION
    Koziel, Grzegorz
    Krawczynski, Bogdan
    Marucha, Jaroslaw
    Wojcicki, Piotr
    Skulimowski, Stanislaw
    12TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE (INTED), 2018, : 7404 - 7409
  • [25] FaultArm: Detecting Fault Injection Vulnerabilities in Arm Assembly
    Kharangate, Prateek
    Rached, Guillermo
    Musungu, Harris
    Niu, Nan
    Wang, Boyang
    IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, NAECON 2024, 2024, : 285 - 290
  • [26] SEPTIC: Detecting Injection Attacks and Vulnerabilities Inside the DBMS
    Medeiros, Iberia
    Beatriz, Miguel
    Neves, Nuno
    Correia, Miguel
    IEEE TRANSACTIONS ON RELIABILITY, 2019, 68 (03) : 1168 - 1188
  • [27] Detecting SOQL-Injection Vulnerabilities in SalesForce Applications
    Saxena, Amitabh
    Sengupta, Shubhashis
    Duraisamy, Pradeepkumar
    Kaulgud, Vikrant
    Chakraborty, Amit
    2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2013, : 489 - 493
  • [28] LogInjector: Detecting Web Application Log Injection Vulnerabilities
    Pan, Zulie
    Chen, Yu
    Chen, Yuanchao
    Shen, Yi
    Li, Yang
    APPLIED SCIENCES-BASEL, 2022, 12 (15):
  • [29] Detecting Injection vulnerabilities in Executable Codes with Concolic Execution
    Mouzarani, Maryam
    Sadeghiyan, Babak
    Zolfaghari, Mohammad
    PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 50 - 57
  • [30] Detecting SQL Injection Attacks Using SNORT IDS
    Alnabulsi, Hussein
    Islam, Md Rafiqul
    Mamun, Quazi
    2014 ASIA-PACIFIC WORLD CONGRESS ON COMPUTER SCIENCE AND ENGINEERING (APWC ON CSE), 2014,