Authors
Sruthi Bandhakavi, Prithvi Bisht, P Madhusudan, VN Venkatakrishnan
Publication date
2007/10/28
Book
Proceedings of the 14th ACM conference on Computer and communications security
Pages
12-24
Description
SQL injection attacks are one of the topmost threats for applications written for the Web. These attacks are launched through specially crafted user input on web applications that use low level string operations to construct SQL queries. In this work, we exhibit a novel and powerful scheme for automatically transforming web applications to render them safe against all SQL injection attacks.
A characteristic diagnostic feature of SQL injection attacks is that they change the intended structure of queries issued. Our technique for detecting SQL injection is to dynamically mine the programmer-intended query structure on any input, and detect attacks by comparing it against the structure of the actual query issued. We propose a simple and novel mechanism, called CANDID, for mining programmer intended queries by dynamically evaluating runs over benign candidate inputs. This mechanism is theoretically well founded …
Total citations
20072008200920102011201220132014201520162017201820192020202120222023202425152717171715122110912155736
Scholar articles
S Bandhakavi, P Bisht, P Madhusudan… - Proceedings of the 14th ACM conference on Computer …, 2007