IFIP — The International Federation for Information Processing
DOI: 10.1007/0-387-24486-7_12
|View full text |Cite
|
Sign up to set email alerts
|

Threat Modelling for SQL Servers

Abstract: Abstract:In this paper we present the results from an analysis focusing on security threats that can arise against an SQL server when included in Web application environments. The approach used is based on the STRIDE classification methodology. The results presented provide also some general guidelines and countermeasures against the different attacks that can exploit the identified vulnerabilities.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 1 publication
0
8
0
Order By: Relevance
“…Even though stored procedures are not usually associated with strong encapsulation principles, they can be very much used to provide an additional layer of access control and to implement arbitrarily complex access control. In particular, the use of stored procedures for improving database security is often recommended among best practices for protecting databases against various types of threats, such as SQL injection [12]. However, the use of stored procedures requires making sure that only those stored procedures are used whose origin and behavior are well-known.…”
Section: Discretionary Access Control Systems For Object-based Databamentioning
confidence: 99%
“…Even though stored procedures are not usually associated with strong encapsulation principles, they can be very much used to provide an additional layer of access control and to implement arbitrarily complex access control. In particular, the use of stored procedures for improving database security is often recommended among best practices for protecting databases against various types of threats, such as SQL injection [12]. However, the use of stored procedures requires making sure that only those stored procedures are used whose origin and behavior are well-known.…”
Section: Discretionary Access Control Systems For Object-based Databamentioning
confidence: 99%
“…The aim of this project is to provide an application developer with a tool that allows him to prevent the exploitation of a broad range of threats. Several academic teams investigated common threats in five areas, each focusing on one particular technological building block for web applications [1,2,3,4]. One of these is the smart card, and in particular the electronic identity card (elD card).…”
Section: Introductionmentioning
confidence: 99%
“…Swiderski and Snyder [25] introduced the concept of threat modeling, and a structured approach for identifying, evaluating and mitigating risks to system security. A similar approach has been proposed for web application environments [4]. Several general purpose tools have been developed, including Microsoft's Security Assessment Tool [20] and Citicus [6].…”
Section: The State Of the Artmentioning
confidence: 99%