scispace - formally typeset
Search or ask a question
Topic

SQL injection

About: SQL injection is a research topic. Over the lifetime, 2174 publications have been published within this topic receiving 33241 citations. The topic is also known as: SQLI.


Papers
More filters
Posted Content
TL;DR: The proof of concept code combines techniques seen in the wild, in the form of SQL injections leading to cross-site scripting JavaScript inclusion, and seen inThe laboratory, inthe form ofSQL quines propa- gated via RFIDs, resulting in a hybrid code injection.
Abstract: Delving into present trends and anticipating future malware trends, a hybrid, SQL on the server-side, JavaScript on the client-side, self-replicating worm based on two-stage quines was designed and implemented on an ad-hoc scenario instantiating a very common software pattern. The proof of concept code combines techniques seen in the wild, in the form of SQL injections leading to cross-site scripting JavaScript inclusion, and seen in the laboratory, in the form of SQL quines propa- gated via RFIDs, resulting in a hybrid code injection. General features of hybrid worms are also discussed.
01 Jan 2016
TL;DR: This paper proposes automatic web vulnerability scanner which helps to locate the vulnerabilities using software fault injection techniques and are popular among developers of web application.
Abstract: Server Side attack occurs by injecting script in HTML pages and allows the exploitation of a web application .It can be exploited through the manipulation of SSI in use .Cross site scripting (XSS) is one of the major problem in any web application. Two of the mostly widely spread and dangerous vulnerabilities in web applications are SQL injection and cross site scripting (XSS) because of the damage they may cause to victim. Fault that allows these attacks to succeed are quite widespread and can occur anywhere a web application uses. Web applications are developed with hard time constraints and are often deployed with security vulnerabilities. In this paper we propose automatic web vulnerability scanner which helps us to locate the vulnerabilities using software fault injection techniques and are popular among developers of web application. The results are then compared by analyzing coverage of vulnerability detection and false positives. The scanning tools are evaluated and the results show that coverage is low and percentage of false positives is high.
Journal ArticleDOI
01 Dec 2013
TL;DR: This study constructed the feature space by using the property of the distribution of SQL injection attack, and proposed an attack detection method, showing the importance concerning the construction of feature space.
Abstract: SQL injection is an attack of type to insert malicious query via an input form on web site. If SQL injection attack were successful, there are the threats of unauthorized access, information leak or falsification of data for web applications driven database system. In the conventional studies, a lot of prevention and detection methods using pattern matching, parsing or machine learning have been developed. However, it is easy to evade detection by modifying the strings of SQL injection attacks. Therefore, it is very important to investigate the essence of SQL injection attacks for preventing such evasion of detection. In this study, we constructed the feature space by using the property of the distribution of SQL injection attack, and proposed an attack detection method. The result of this study is showing the importance concerning the construction of feature space.
Patent
19 Jul 2019
TL;DR: In this article, an SQL injection detection method and a data processing method are presented. And the method is based on encoding a detection object according to an encoding table to obtain an encoding result, wherein the encoding table records a corresponding relationship between the character category and the code; and determining whether SQL injection exists inthe detection object or not according to the coding result.
Abstract: The invention discloses an SQL injection detection method and a data processing method. The SQL injection detection method comprises the following steps: encoding a detection object according to an encoding table to obtain an encoding result; wherein the encoding table records a corresponding relationship between the character category and the code; and determining whether SQL injection exists inthe detection object or not according to the coding result. According to the method and the device, quick detection of SQL injection is realized, the detection effect is improved, and the defense costis reduced.

Network Information
Related Topics (5)
Authentication
74.7K papers, 867.1K citations
77% related
Encryption
98.3K papers, 1.4M citations
76% related
Web page
50.3K papers, 975.1K citations
75% related
Software system
50.7K papers, 935K citations
75% related
Object (computer science)
106K papers, 1.3M citations
74% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202373
2022165
202182
2020109
2019138