SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks

ABM Ali, MS Abdullah, J Alostad - Procedia Computer Science, 2011 - Elsevier
… Detecting the SQL-injection vulnerability requires the development of a powerful tool that
can automatically create SQLinjection attacks using efficient features (different attacking patters…

Automatic creation of SQL injection and cross-site scripting attacks

A Kieyzun, PJ Guo, K Jayaraman… - 2009 IEEE 31st …, 2009 - ieeexplore.ieee.org
… This paper presents an automatic technique for creating inputs that expose SQLI and XSS …
addresses second-order XSS attacks. Our technique creates real attack vectors, has few false …

[PDF][PDF] Detection and prevention of SQL injection attack: a survey

ZS Alwan, MF Younis - … Journal of Computer Science and Mobile …, 2017 - researchgate.net
SQL Injection attacks, and Detection and Prevention techniques, while the modern SQL
Injection attacks, … Jayaraman, and MD Ernst, “Automatic creation of SQL injection and cross-site …

CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks

P Bisht, P Madhusudan… - ACM Transactions on …, 2010 - dl.acm.org
… for automatically transforming Web applications to render them safe against all SQL injection
attacks. … Our technique for detecting SQL injection is to dynamically mine the programmer-…

Advanced automated SQL injection attacks and defensive mechanisms

VK Gudipati, T Venna, S Subburaj… - … & Automation (CT …, 2016 - ieeexplore.ieee.org
… still tend to be vulnerable to SQL injection attacks. Technology has … are exploited using the
SQL injection methodologies. The … attack increased that lead to the creation of automated SQL

SQLrand: Preventing SQL injection attacks

SW Boyd, AD Keromytis - … , ACNS 2004, Yellow Mountain, China, June 8 …, 2004 - Springer
… We present a practical protection mechanism against SQL injection attacks. Such attacks
target … We apply the same technique to the problem of SQL injection attacks: we create

[图书][B] SQL injection attacks and defense

J Clarke-Salt - 2009 - books.google.com
… interacting blind SQL injection shell and developing TCP socket reusing attacking techniques.
… Dave has also been actively engaged in creating a US centric examination process in …

Generation of SQL-injection free secure algorithm to detect and prevent SQL-injection attacks

K Natarajan, S Subramani - Procedia Technology, 2012 - Elsevier
… ; eventually most of them are SQL injection attacks [6, 7 and 10]. 1.1 Background of the
SQL Injection Attacks (SQLIAs) SQL injection attack (code injection) is the most common and …

Preventing SQL injection attacks in stored procedures

K Wei, M Muthuprasanna… - … Conference (ASWEC'06), 2006 - ieeexplore.ieee.org
… An SQL injection attack targets interactive web applications … SQL injection attacks. Some
papers in literature even refer to stored procedures as a remedy against SQL injection attacks. …

[PDF][PDF] Detection and Prevention of SQL Injection attack

M Kumar, L Indu - International Journal of Computer Science and …, 2014 - Citeseer
… countermeasures of SQL injection. … SQL by replacing the original queries and create some
parameterized query in database. These attacks force to developer for first define the SQL