[PDF][PDF] Systematic literature review on SQL injection attack

MA Lawal, ABM Sultan, AO Shakiru - International Journal of Soft …, 2016 - researchgate.net
SQL injection attack is a common threat to web applications that utilizes poor input validation
to implement attack on a target database. It is becoming a very serious problem in web …

A survey on web application vulnerabilities (SQLIA, XSS) exploitation and security engine for SQL injection

R Johari, P Sharma - 2012 international conference on …, 2012 - ieeexplore.ieee.org
Today almost all organizations have improved their performance through allowing more
information exchange within their organization as well as between their distributers …

[PDF][PDF] SQL injection attacks countermeasures assessments

M Alenezi, M Nadeem, R Asif - Indonesian Journal of Electrical …, 2021 - researchgate.net
SQL injections attacks have been rated as the most dangerous vulnerability of web-based
systems over more than a decade by OWASP top ten. Though different static, runtime and …

A survey on SQL injection attacks, detection and prevention techniques

P Kumar, RK Pateriya - 2012 Third International Conference on …, 2012 - ieeexplore.ieee.org
SQL Injection poses a serious security issue over the Internet or over web application. In
SQL injection attacks, hackers can take advantage of poorly coded Web application software …

A suite of abstract domains for static analysis of string values

G Costantini, P Ferrara, A Cortesi - Software: Practice and …, 2015 - Wiley Online Library
Strings are widely used in modern programming languages in various scenarios. For
instance, strings are used to build up Structured Query Language (SQL) queries that are …

Static analysis of string values

G Costantini, P Ferrara, A Cortesi - … , ICFEM 2011, Durham, UK, October 26 …, 2011 - Springer
In this paper we propose a unifying approach for the static analysis of string values based on
abstract interpretation, and we present several abstract domains that track different types of …

Integrated approach to prevent SQL injection attack and reflected cross site scripting attack

P Sharma, R Johari, SS Sarma - International Journal of System …, 2012 - Springer
The Internet and web applications are playing very important role in our today's modern day
life. Several activities of our daily life like browsing, online shopping and booking of travel …

[PDF][PDF] A survey on the detection of SQL injection attacks and their countermeasures

B Nagpal, N Chauhan, N Singh - Journal of Information Processing …, 2017 - koreascience.kr
Abstract The Structured Query Language (SQL) Injection continues to be one of greatest
security risks in the world according to the Open Web Application Security Project's …

SECSIX: security engine for CSRF, SQL injection and XSS attacks

B Nagpal, N Chauhan, N Singh - International Journal of System …, 2017 - Springer
With the increase in human-web interaction, vulnerabilities has surfaced the various
networks. With the rapidly growing technology, the ease of accessibility through web …

[PDF][PDF] A systematic literature review on sql injection attacks techniques and common exploited vulnerabilities

SA Faker, MA Muslim, HS Dachlan - International Journal of …, 2017 - academia.edu
Database faces several threats such as Cross Site Scripting Attack (XSS), phishing, Denial
of Service (DoS) and SQL injection attack. SQL injection attack is the major concern and the …