Semi-Automated Verification of Defense against SQL Injection in Web Applications
Author(s) -
Kaiping Liu,
Hee Beng Kuan Tan,
Lwin Khin Shar
Publication year - 2012
Publication title -
singapore management university institutional knowledge (ink) (singapore management university)
Language(s) - English
Resource type - Conference proceedings
ISSN - 1530-1362
ISBN - 978-1-4673-4930-7
DOI - 10.1109/apsec.2012.18
Subject(s) - sql injection , computer science , code (set theory) , web application , process (computing) , sql , set (abstract data type) , audit , database , software engineering , source code , computer security , programming language , world wide web , query by example , search engine , management , economics , web search query
Recent reports reveal that majority of the attacks to Web applications are input manipulation attacks. Among these attacks, SQL injection attack malicious input is submitted to manipulate the database in a way that was unintended by the applications' developers is one such attack. This paper proposes an approach for assisting to code verification process on the defense against SQL injection. The approach extracts all such defenses implemented in code. With the use of the proposed approach, developers, testers or auditors can then check the defenses extracted from code to verify their adequacy. We have evaluated the feasibility, effectiveness, and usefulness of the proposed approach by a set of open-source systems. Our experiment results showed that the proposed approach is effective in extracting all the possible defenses implemented/adopted by Web applications. We observed that the proposed approach would be useful in identifying the false positive cases resulting from other related approaches and auditing the code in order to fix the actual vulnerable cases.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom