[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/ISCC.2010.5546750guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Obfuscation-based analysis of SQL injection attacks

Published: 22 June 2010 Publication History

Abstract

In this paper, we propose an obfuscation/ deobfuscation based technique to detect the presence of possible SQL Injection Attacks (SQLIA) in a query before submitting it to a DBMS. This technique combines static and dynamic analysis. In the static phase, the queries in the application are replaced by queries in obfuscated form. The main idea behind obfuscation is to isolate all the atomic formulas from other control elements of the query. During the dynamic phase, the user inputs are merged into the obfuscated atomic formulas, and the dynamic verifier analysis the presence of possible SQLIA at atomic formula level. Finally, a deobfuscation step is performed to recover the original query before submitting it to the DBMS.

Cited By

View all
  • (2021)Active Learning for Inference and Regeneration of Applications that Access DatabasesACM Transactions on Programming Languages and Systems10.1145/343095242:4(1-119)Online publication date: 22-Jan-2021
  • (2019)Using active learning to synthesize models of applications that access databasesProceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation10.1145/3314221.3314591(269-285)Online publication date: 8-Jun-2019
  • (2016)AutoRandProceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment - Volume 972110.1007/978-3-319-40667-1_3(37-57)Online publication date: 7-Jul-2016
  • Show More Cited By

Index Terms

  1. Obfuscation-based analysis of SQL injection attacks
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ISCC '10: Proceedings of the The IEEE symposium on Computers and Communications
    June 2010
    1227 pages
    ISBN:9781424477548

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 22 June 2010

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 13 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Active Learning for Inference and Regeneration of Applications that Access DatabasesACM Transactions on Programming Languages and Systems10.1145/343095242:4(1-119)Online publication date: 22-Jan-2021
    • (2019)Using active learning to synthesize models of applications that access databasesProceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation10.1145/3314221.3314591(269-285)Online publication date: 8-Jun-2019
    • (2016)AutoRandProceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment - Volume 972110.1007/978-3-319-40667-1_3(37-57)Online publication date: 7-Jul-2016
    • (2015)A suite of abstract domains for static analysis of string valuesSoftware—Practice & Experience10.1002/spe.221845:2(245-287)Online publication date: 1-Feb-2015
    • (2013)Abstract program slicing of database query languagesProceedings of the 28th Annual ACM Symposium on Applied Computing10.1145/2480362.2480524(838-845)Online publication date: 18-Mar-2013
    • (2011)Static analysis of string valuesProceedings of the 13th international conference on Formal methods and software engineering10.5555/2075089.2075132(505-521)Online publication date: 26-Oct-2011

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media