A Mutation Approach of Detecting SQL Injection Vulnerabilities

被引:5
|
作者
Huang, Yanyu [1 ]
Fu, Chuan [1 ]
Chen, Xuan [1 ]
Guo, Hao [1 ]
He, Xiaoyu [1 ]
Li, Jin [1 ]
Liu, Zheli [1 ]
机构
[1] Nankai Univ, Tianjin, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Vulnerability; Test generation; Mutation operators; ATTACKS;
D O I
10.1007/978-3-319-68542-7_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As Internet is increasingly prosperous, Web services become more common in our social life. As users can access pages on the Web directly, Web application plays a vital role in various domains such as e-finance and public-services. Inevitably, it will be followed by unprecedented amount of attacks and exploitations. Amongst all of those attacks, SQL injection attacks have consistently high rank in last years due to corresponding vulnerabilities. It is crucial to checking this vulnerabilities before web services being public. In our paper we present an effective approach for testing, MOSA, and mutation operators set to its underpinning. Using this approach we can produce test inputs that cause executable and malignant SQL statement efficiently. Besides that, we do numerous experiments and the results demonstrate that the mutation approach can detect SQL injection vulnerabilities and generate inputs that bypass web application firewalls.
引用
收藏
页码:175 / 188
页数:14
相关论文
共 50 条
  • [41] SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement Learning
    Al Wahaibi, Salim
    Foley, Myles
    Maffeis, Sergio
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6097 - 6114
  • [42] Finding SQL Injection and Cross Site Scripting Vulnerabilities with Diverse Static Analysis Tools
    Algaith, Areej
    Nunes, Paulo
    Fonseca, Jose
    Gashi, Ilir
    Vieira, Marco
    2018 14TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2018), 2018, : 57 - 64
  • [43] Mining SQL Injection and Cross Site Scripting Vulnerabilities using Hybrid Program Analysis
    Shar, Lwin Khin
    Tan, Hee Beng Kuan
    Briand, Lionel C.
    PROCEEDINGS OF THE 35TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2013), 2013, : 642 - 651
  • [44] Correlation Approach for SQL Injection Attacks Detection
    Choras, Michal
    Kozik, Rafal
    Puchalski, Damian
    Holubowicz, Witold
    INTERNATIONAL JOINT CONFERENCE CISIS'12 - ICEUTE'12 - SOCO'12 SPECIAL SESSIONS, 2013, 189 : 177 - +
  • [45] A New Approach for SQL-Injection Detection
    Shi, Cong-cong
    Zhang, Tao
    Yu, Yong
    Lin, Weimin
    INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS, 2012, 127 : 245 - 254
  • [46] MUSIC: Mutation-based SQL Injection Vulnerability Checking
    Shahriar, Hossain
    Zulkernine, Mohammad
    QSIC 2008: PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2008, : 77 - 86
  • [47] Mining Input Sanitization Patterns for Predicting SQL Injection and Cross Site Scripting Vulnerabilities
    Shar, Lwin Khin
    Tan, Hee Beng Kuan
    2012 34TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2012, : 1293 - 1296
  • [48] OBJECT ORIENTED APPROACH TO SQL INJECTION PREVENTER
    Giri, D. Ratna
    Kumar, S. Praveen
    Prasannakumar, L.
    Murthy, R. N. V. Vishnu
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [49] Combinatorial Approach for Preventing SQL Injection Attacks
    Ezumalai, R.
    Aghila, G.
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1212 - 1217
  • [50] Enhanced Approach to Detection of SQL Injection Attack
    Karuparthi, Raja Prasad
    Zhou, Bing
    2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), 2016, : 466 - 469