[HTML][HTML] Provably throttling SQLI using an enciphering query and secure matching

MA Hussain, ZA Hussien, ZA Abduljabbar, J Ma… - Egyptian Informatics …, 2022 - Elsevier
Web applications, which dominate the internet, act as communication media between
customers and service providers. Web applications are an internet innovation that provide …

Sql injection detection for web applications based on elastic-pooling cnn

X Xie, C Ren, Y Fu, J Xu, J Guo - IEEE Access, 2019 - ieeexplore.ieee.org
An enterprise's data can be one of its most important assets and often critical to the firm's
development and survival. SQL injection attack is ranked first in the top ten risks to network …

Mistrust Plugins You Must: A {Large-Scale} Study Of Malicious Plugins In {WordPress} Marketplaces

RP Kasturi, J Fuller, Y Sun, O Chabklo… - 31st USENIX Security …, 2022 - usenix.org
Modern websites owe most of their aesthetics and functionalities to Content Management
Systems (CMS) plugins, which are bought and sold on widely popular marketplaces. Driven …

Review of SQL injection: problems and prevention

MAM Yunus, MZ Brohan, NM Nawi, ESM Surin… - … : International Journal on …, 2018 - joiv.org
SQL injection happened in electronic records in database and it is still exist even after two
decades since it first happened. Most of the web-based applications are still vulnerable to …

Review of SQL injection attacks: Detection, to enhance the security of the website from client-side attacks

MHA AL-Maliki, MN Jasim - International Journal of Nonlinear …, 2022 - ijnaa.semnan.ac.ir
The importance of cyber-security in protecting data and information is huge in this era of
technology. With the number of cyber-attacks increasing daily, the security system has been …

On the vulnerabilities of text-to-sql models

X Peng, Y Zhang, J Yang… - 2023 IEEE 34th …, 2023 - ieeexplore.ieee.org
Although it has been demonstrated that Natural Language Processing (NLP) algorithms are
vulnerable to deliberate attacks, the question of whether such weaknesses can lead to …

A survey on SQL injection attacks, detection and prevention

J Hu, W Zhao, Y Cui - Proceedings of the 2020 12th International …, 2020 - dl.acm.org
Since the uses of Web in daily life is increasing in past 20 years and becoming trend now,
almost every Web application has its own database to store important data. An attacker can …

TARDIS: Rolling back the clock on CMS-targeting cyber attacks

RP Kasturi, Y Sun, R Duan, O Alrawi… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Over 55% of the world's websites run on Content Management Systems (CMS).
Unfortunately, this huge user population has made CMS-based websites a high-profile …

Navigating the Cyber Threat Landscape: A Comprehensive Analysis of Attacks and Security in the Digital Age

AI Jony, SA Hamim - Journal of Information Technology and …, 2023 - jurnal.untag-sby.ac.id
In this contemporary digital age, cybersecurity stands as a crucial linchpin amid the
expanding role of technology in our lives, encountering numerous challenges. This review …

On the security vulnerabilities of text-to-sql models

X Peng, Y Zhang, J Yang, M Stevenson - arXiv preprint arXiv:2211.15363, 2022 - arxiv.org
Although it has been demonstrated that Natural Language Processing (NLP) algorithms are
vulnerable to deliberate attacks, the question of whether such weaknesses can lead to …