2012 IEEE 36th Annual Computer Software and Applications Conference Workshops 2012
DOI: 10.1109/compsacw.2012.108
|View full text |Cite
|
Sign up to set email alerts
|

Attack Model Based Penetration Test for SQL Injection Vulnerability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 11 publications
0
10
0
1
Order By: Relevance
“…In "SQL Injection Attack and Defense", whitelist validation and blacklist validation are two different types of input validation methods to defend against SQL injection [6]. Penetration testing can make up for the deficiencies of blacklist and whitelist filtering defense mechanisms, but it cannot fundamentally solve the deficiencies [7]. Halfond and Orso [8] developed a tool, AMNESIA, based on traditional blacklisting techniques, implementing a combined dynamic and static approach, which in its static part automatically constructs a model of legitimate queries that can be generated by the application.…”
Section: Sql Injection Detection Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In "SQL Injection Attack and Defense", whitelist validation and blacklist validation are two different types of input validation methods to defend against SQL injection [6]. Penetration testing can make up for the deficiencies of blacklist and whitelist filtering defense mechanisms, but it cannot fundamentally solve the deficiencies [7]. Halfond and Orso [8] developed a tool, AMNESIA, based on traditional blacklisting techniques, implementing a combined dynamic and static approach, which in its static part automatically constructs a model of legitimate queries that can be generated by the application.…”
Section: Sql Injection Detection Methodsmentioning
confidence: 99%
“…(6) Time blind injection: it mainly refers to inserting a time delay function in the URL or user input to determine whether the injection is successful by observing whether there is a delay in the web application's response. (7) Multistatement attack: this attack generally uses query separators to add additional queries to the original query to extract, add, and modify data or execute remote commands. e DBMS receives multiple SQL queries, the first is the normal execution of the query, and the subsequent queries are executed to meet the attack.…”
Section: Sql Injection Statementsmentioning
confidence: 99%
“…Tian et al [11] concentrate on penetration test cases for web applications by modeling SQLI attacks using security goal models (SGM's) from [12]. First they describe a general view for the attack, then they branch this model further by concentrating on the type of goals the attacker has in mind, e.g.…”
Section: Related Workmentioning
confidence: 99%
“…Namely, we choose the Advanced Combinatorial Testing System (ACTS) 11 in order to generate input strings, which is a tool for the generation of combinatorial multi-way test sets according to specified parameter elements, which in 11 http://csrc.nist.gov/groups/SNS/acts/documents/comparison-report.html our case is adapted to HTML so valid scripts are constructed. Generally speaking, the tool is used in combinatorial testing and is also considered in the area of automated software testing.…”
Section: Precondition(s)mentioning
confidence: 99%
“…Traditional test case generation techniques mainly rely on software engineers to specify rules to create a set of semantically tailored test cases, either in a manual [3,4] or semi -automatic manner [5][6][7]. Such process is of limited flexibility due to the restriction of human crafted rules.…”
Section: Introductionmentioning
confidence: 99%