SQL injection

Known as: SQL inject, Little Bobby Tables, Sql injection attack 
SQL injection is a code injection technique, used to attack data-driven applications, in which nefarious SQL statements are inserted into an entry… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1994-2018
05010019942018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
The best strategy for combating SQL injection, which has emerged as the most widespread website security risk, calls for… (More)
  • table 1
  • figure 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and cross-site scripting… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
SQL injection attacks are one of the topmost threats for applications written for the Web. These attacks are launched through… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2006
Highly Cited
2006
SQL injection attacks pose a serious threat to the security of Web applications because they can give attackers unrestricted… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
An SQL injection attack targets interactive Web applications that employ database services. These applications accept user inputs… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills… (More)
  • figure 1
  • figure 4
  • figure 6
  • table 1
  • table 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Most object oriented applications that involve persistent data interact with a relational database. The most common interaction… (More)
  • figure 1
  • figure 3
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We present a practical protection mechanism against SQL injection attacks. Such attacks target databases that are accessible… (More)
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We describe a new, general approach for safeguarding systems against <i>any</i> type of code-injection attack. We apply Kerckhoff… (More)
  • figure 1
  • table 1
Is this relevant?