Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Detecting SQL injection attacks using query result size

Full metadata record
DC Field Value Language
dc.contributor.authorJang, Young-Su-
dc.contributor.authorChoi, Jin-Young-
dc.date.accessioned2021-09-05T07:14:30Z-
dc.date.available2021-09-05T07:14:30Z-
dc.date.created2021-06-15-
dc.date.issued2014-07-
dc.identifier.issn0167-4048-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/98031-
dc.description.abstractWeb applications are becoming an essential part of our everyday lives, with many of our activities dependent on the functionality and security of these applications. Web applications are ubiquitous, perform mission critical tasks, and handle sensitive user data. As the scale of these applications grows, injection vulnerabilities, such as SQL injections, become major security challenges. Most of these vulnerabilities stem from a lack of input validation; that is, web applications use malicious input as part of a sensitive operation without properly checking or sanitizing the input values. SQL injection attacks target databases that are accessible through a web front-end; moreover, they take advantage of flaws in the input validation logic of web components. In this paper, we exhibit a novel scheme that automatically transforms web applications, rendering them safe against SQL injection attacks. Our technique dynamically analyzes the developer-intended query result size for any input, and detects attacks by comparing this against the result of the actual query. We implement this technique in a tool for protecting Java-based web applications. An experimental evaluation demonstrates that our technique is effective against SQL injection vulnerabilities. (C) 2014 Published by Elsevier Ltd.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER ADVANCED TECHNOLOGY-
dc.subjectPRECISE ANALYSIS-
dc.titleDetecting SQL injection attacks using query result size-
dc.typeArticle-
dc.contributor.affiliatedAuthorChoi, Jin-Young-
dc.identifier.doi10.1016/j.cose.2014.04.007-
dc.identifier.scopusid2-s2.0-84902299651-
dc.identifier.wosid000337879700008-
dc.identifier.bibliographicCitationCOMPUTERS & SECURITY, v.44, pp.104 - 118-
dc.relation.isPartOfCOMPUTERS & SECURITY-
dc.citation.titleCOMPUTERS & SECURITY-
dc.citation.volume44-
dc.citation.startPage104-
dc.citation.endPage118-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.subject.keywordPlusPRECISE ANALYSIS-
dc.subject.keywordAuthorWeb applications-
dc.subject.keywordAuthorSensitive operation-
dc.subject.keywordAuthorInput validation-
dc.subject.keywordAuthorSanitization-
dc.subject.keywordAuthorSQL injection-
dc.subject.keywordAuthorQuery result size-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher CHOI, Jin Young photo

CHOI, Jin Young
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE