2022
DOI: 10.1002/stvr.1826
|View full text |Cite
|
Sign up to set email alerts
|

Combinatorial methods for dynamic gray‐box SQL injection testing

Abstract: This work presents an extended and enhanced gray-box combinatorial security testing methodology for SQL injection vulnerabilities in web applications. We propose multiple new attack grammars modelling SQLi attacks against MySQL-compatible databases, each one targeting a different injection context. Additionally, these grammars are also dynamically refined at the beginning of each attack against an endpoint of a web application, as a further optimization of the used attack model by taking into account the speci… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 51 publications
0
1
0
Order By: Relevance
“…Here are some common threats to web servers: DDoS Attacks: Distributed Denial of Service attacks aim to flood the server with unnecessary requests, overloading its capacity and making it unavailable to legitimate users [17], [18]. SQL Injection: Attackers manipulate a site's database by inputting malicious SQL statements in input fields, potentially leading to unauthorized viewing of data, corrupting or deleting data, and other malicious activities [19], [20]. Cross-Site Scripting (XSS): This occurs when malicious scripts are injected into web pages viewed by users.…”
Section: Web Servermentioning
confidence: 99%
“…Here are some common threats to web servers: DDoS Attacks: Distributed Denial of Service attacks aim to flood the server with unnecessary requests, overloading its capacity and making it unavailable to legitimate users [17], [18]. SQL Injection: Attackers manipulate a site's database by inputting malicious SQL statements in input fields, potentially leading to unauthorized viewing of data, corrupting or deleting data, and other malicious activities [19], [20]. Cross-Site Scripting (XSS): This occurs when malicious scripts are injected into web pages viewed by users.…”
Section: Web Servermentioning
confidence: 99%