A Classification of SQL-Injection Attacks and Countermeasures
@inproceedings{Halfond2006ACO, title={A Classification of SQL-Injection Attacks and Countermeasures}, author={William G. J. Halfond and J. Viegas and A. Orso}, year={2006} }
SQL injection attacks pose a serious security threat to Web applications: they allow attackers to obtain unrestricted access to the databases underlying the applications and to the potentially sensitive information these databases contain. [...] Key Method For each type of attack, we provide descriptions and examples of how attacks of that type could be performed. We also present and analyze existing detection and prevention techniques against SQL injection attacks. For each technique, we discuss its strengths…Expand Abstract
592 Citations
Prevention of SQL Injection Attacks using RC4 and Blowfish Encryption Techniques
- Computer Science
- 2016
- 3
A Weight-Based Symptom Correlation Approach to SQL Injection Attacks
- Computer Science
- 2009 Fourth Latin-American Symposium on Dependable Computing
- 2009
- 22
SQL Injection: The Longest Running Sequel in Programming History
- Computer Science
- J. Digit. Forensics Secur. Law
- 2017
- 1
- PDF
References
SHOWING 1-10 OF 59 REFERENCES
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
- Computer Science
- RAID
- 2005
- 363
- PDF
Combining static analysis and runtime monitoring to counter SQL-injection attacks
- Computer Science
- WODA '05
- 2005
- 102
- PDF
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
- Computer Science
- ASE '05
- 2005
- 598
- PDF
Web application security assessment by fault injection and behavior monitoring
- Computer Science
- WWW '03
- 2003
- 367
- PDF