SQL Injection Attacks and Defense 2009
DOI: 10.1016/b978-1-59749-424-3.00001-3
|View full text |Cite
|
Sign up to set email alerts
|

What Is SQL Injection?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(22 citation statements)
references
References 0 publications
0
22
0
Order By: Relevance
“…It is widely used in enterprise application development. However, it is often suffered from the “SQL-injection” attack 31 . The hackers can get the highest privileges of system with the specific designed SQL query.…”
Section: Extension To the Conference Papersmentioning
confidence: 99%
“…It is widely used in enterprise application development. However, it is often suffered from the “SQL-injection” attack 31 . The hackers can get the highest privileges of system with the specific designed SQL query.…”
Section: Extension To the Conference Papersmentioning
confidence: 99%
“…• An Structured Query Language (SQL) injection, usually implemented as a malware vector, is the input of code into a website's data input, in order to execute malicious commands [49]: "It is the vulnerability that results when you give an attacker the ability to influence the Structured Query Language (SQL) queries that an application passes to a back-end database. By being able to influence what is passed to the database, the attacker can leverage the syntax and capabilities of SQL itself, as well as the power and flexibility of supporting database functionality and operating system functionality available to the database" [50]. For instance, in a site's contact form, the attacker inputs a string of characters in order to manipulate the site's SQL database, instead of merely sending information.…”
Section: The Russo-georgian Warmentioning
confidence: 99%
“…Due to the potential exposure of the site's core data (e.g. usernames and passwords), "SQL injection is one of the most devastating vulnerabilities to impact a business" [50]. • Cross-Site Scripting (XSS) steals the victim's browser cookies as a way to hijack its session [51].…”
Section: The Russo-georgian Warmentioning
confidence: 99%
See 1 more Smart Citation
“…Which may cause to disrupt the system. Justin Clarke [1] described the process of SQL Inject as a weakness in the code where the program does not validate the inputs of user before passing them to SQL queries, which makes the attacker can manipulate the code to execute it on the back-end database.…”
Section: Introductionmentioning
confidence: 99%