A Static Detection Method for SQL Injection Vulnerability Based on Program Transformation

被引:2
|
作者
Yuan, Ye [1 ,2 ]
Lu, Yuliang [1 ,2 ]
Zhu, Kailong [1 ,2 ]
Huang, Hui [1 ,2 ]
Yu, Lu [1 ,2 ]
Zhao, Jiazhen [1 ,2 ]
机构
[1] Natl Univ Def Technol, Coll Elect Engn, Hefei 230037, Peoples R China
[2] Anhui Prov Key Lab Cyberspace Secur Situat Awarene, Hefei 230037, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 21期
关键词
static analysis; object-oriented; database extensions; program transformation-based; detection of SQL injection vulnerabilities; WEB APPLICATION VULNERABILITIES;
D O I
10.3390/app132111763
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Static analysis is popular for detecting SQL injection vulnerabilities. However, due to the lack of accurate modeling of object-oriented database extensions, current methods fail to accurately detect SQL injection vulnerabilities in applications that use object-oriented database extensions. We propose a program transformation-based SQL injection vulnerability detection method to address this issue. This method consists of two stages: program transformation and vulnerability detection. In the first stage, object-oriented database extensions are automatically transformed into semantically equivalent procedural database extensions through the identification of key statements, call relation verification, and program transformation. In the second stage, application programs are automatically scanned using a combination of control flow graph construction and taint analysis techniques to detect SQL injection vulnerabilities. Based on the proposed method, we have implemented the OODBE-SCAN prototype system and performed experimental analysis on eight modern PHP applications. We compare OODBE-SCAN with two related static analysis tools, RIPS and Seay. The results show that OODBE-SCAN can detect more real-world vulnerabilities and has higher accuracy than existing methods.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Research on SQL Injection Vulnerability Attack model
    Su, Guanyu
    Wang, Fang
    Li, Qi
    PROCEEDINGS OF 2018 5TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2018, : 217 - 221
  • [22] sqlFuzz: Directed Fuzzing for SQL Injection Vulnerability
    Yuan, Ye
    Lu, Yuliang
    Zhu, Kailong
    Huang, Hui
    Chen, Yuanchao
    Zhang, Yifan
    ELECTRONICS, 2024, 13 (15)
  • [23] SDSIOT: An SQL Injection Attack Detection and Stage Identification Method Based on Outbound Traffic
    Fu, Houlong
    Guo, Chun
    Jiang, Chaohui
    Ping, Yuan
    Lv, Xiaodan
    ELECTRONICS, 2023, 12 (11)
  • [24] SQL-injection vulnerability scanning tool for automatic creation of SQL-injection attacks
    Ali, Abdul Bashah Mat
    Shakhatreh, Ala' Yaseen Ibrahim
    Abdullah, Mohd Syazwan
    Alostad, Jasem
    WORLD CONFERENCE ON INFORMATION TECHNOLOGY (WCIT-2010), 2011, 3
  • [25] SQL Injection Detection Based on Deep Belief Network
    Zhang, Huafeng
    Zhao, Bo
    Yuan, Hui
    Zhao, Jinxiong
    Yan, Xiaobin
    Li, Fangjun
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2019), 2019,
  • [26] Static vulnerability detection based on class separation☆
    Zhang, Chunyong
    Xin, Yang
    JOURNAL OF SYSTEMS AND SOFTWARE, 2023, 206
  • [27] Detection of SQL injection based on artificial neural network
    Tang, Peng
    Qiu, Weidong
    Huang, Zheng
    Lian, Huijuan
    Liu, Guozhen
    KNOWLEDGE-BASED SYSTEMS, 2020, 190
  • [28] SQL Injection Attack Detection Method using Expectation Criterion
    Xiao, Linghuan
    Matsumoto, Shinichi
    Ishikawa, Tomohisa
    Sakurai, Kouichi
    2016 FOURTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING (CANDAR), 2016, : 649 - 654
  • [29] Detection Method of SQL injection Attack in Cloud Computing Environment
    Wang, Kuisheng
    Hou, Yan
    PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 487 - 493
  • [30] SQL-IDS: A Specification-based Approach for SQL-Injection Detection
    Kemalis, Konstantinos
    Tzouramanis, Theodoros
    APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 2153 - 2158