2007
DOI: 10.1007/s11416-007-0075-8
|View full text |Cite
|
Sign up to set email alerts
|

SQL infections through RFID

Abstract: Automatic identification and collection (AIDC) technologies have made the life of a man much easier on numerous platforms. Of the various such technologies the radio frequency identification devices (RFID) have become pervasive essentially because they can track from a greater physical distance than the rest. The back end that supports these RFID systems has always been working well until they encounter a sbadly-formatted RFID tag. There have hardly been any incidents where such tags, once identified by the ba… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…Microsoft Visual C++ programming system can automatically generate the procedural framework, with first-class management flexibility. [1] This system based on a simple personnel management information system of common enterprises, give full play to the amount of information stored in SQL database big advantage, combined with the powerful function of C++ language in programming, and developed the personnel information management system has its own characteristics. This design is mainly to achieve the following functions: staff information browsing, add and delete functions, query, sorting screening function, authority restriction function, salary calculation function.…”
Section: Programming Systemmentioning
confidence: 99%
“…Microsoft Visual C++ programming system can automatically generate the procedural framework, with first-class management flexibility. [1] This system based on a simple personnel management information system of common enterprises, give full play to the amount of information stored in SQL database big advantage, combined with the powerful function of C++ language in programming, and developed the personnel information management system has its own characteristics. This design is mainly to achieve the following functions: staff information browsing, add and delete functions, query, sorting screening function, authority restriction function, salary calculation function.…”
Section: Programming Systemmentioning
confidence: 99%
“…For example, in MS SQL Server, XP_CmdShell of the database will carry out a random instruction of the operating system [6].…”
Section: B Realizing the Sql Injection Attacks Throughmentioning
confidence: 99%
“…--", then following "WHERE Uid=%id" will be the annotation, and no longer be compiled [6]. This UPDATE sentence will affect each line in the field "Contents", realize their own duplication, and create the destruction to all of the original information of this field.…”
Section: Update Container Set Contents = '%S' Where Uid=%idmentioning
confidence: 99%
“…In our previous work [6], we also demonstrated such vulnerabilities in MS SQL system which the other paper fell short on. We showed how attackers can use SQL injection attacks in conjunction with RFID middleware to compromise the infrastructure [7]. SQL injection happens when a developer accepts user input that is directly placed into a SQL Statement and doesn't properly filter out dangerous characters.…”
Section: Related Workmentioning
confidence: 99%