메뉴 건너뛰기




Volumn , Issue , 2007, Pages 12-24

CANDID: Preventing SQL injection attacks using dynamic candidate evaluations

Author keywords

Dynamic monitoring; Retrofitting code; SQL injection attacks; Symbolic evalua tion

Indexed keywords

DIAGNOSTIC FEATURES; DYNAMIC MONITORING; LOW LEVEL; QUERY STRUCTURES; SQL INJECTION; SQL QUERY; USER INPUT; WEB APPLICATION;

EID: 49949109144     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1315245.1315249     Document Type: Conference Paper
Times cited : (95)

References (30)
  • 1
    • 77952381936 scopus 로고    scopus 로고
    • Online SQL syntax checker
    • Online SQL syntax checker. http://www.wangz.net/gsqlparser/sqlpp/ sqlformat.htm.
  • 2
    • 77952369918 scopus 로고    scopus 로고
    • How prevalent are SQL injection vulnerabilities?
    • Oct
    • SUTTON, M. How prevalent Are SQL Injection vulnerabilities? Internet Bulletin, Oct. 2006.
    • (2006) Internet Bulletin
    • Sutton, M.1
  • 3
    • 17044362578 scopus 로고    scopus 로고
    • Synthesis of interface specifications for JAVA classes
    • ALUR, R., CERNÝ, P., MADHUSUDAN, P., AND NAM, W. Synthesis of interface specifications for JAVA classes. In POPL (2005), pp. 98-109.
    • (2005) POPL , pp. 98-109
    • Alur, R.1    Cerný, P.2    Madhusudan, P.3    Nam, W.4
  • 4
    • 0036038253 scopus 로고    scopus 로고
    • Mining specifications
    • AMMONS, G., BODÍK, R., AND LARUS, J. R. Mining specifications. In POPL (2002), pp. 4-16.
    • (2002) POPL , pp. 4-16
    • Ammons, G.1    Bodík, R.2    Larus, J.R.3
  • 5
    • 0038304275 scopus 로고    scopus 로고
    • Advanced SQL injection in SQL server applications
    • Next Generation Security Software Ltd. Tech. rep.
    • ANLEY, C. Advanced SQL injection in SQL server applications, White paper, Next Generation Security Software Ltd. Tech. rep., 2002.
    • (2002) White Paper
    • Anley, C.1
  • 6
    • 77952418442 scopus 로고    scopus 로고
    • APACHE
    • APACHE. The JMeter project. http://jakarta.apache.org/jmeter/.
    • The JMeter Project
  • 7
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • USAF Electronic Systems Division, Bedford, MA, Apr
    • BIBA, K. J. Integrity considerations for secure computer systems. Tech. Rep. ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA, Apr. 1977.
    • (1977) Tech. Rep. ESD-TR-76-372
    • Biba, K.J.1
  • 8
    • 35048851186 scopus 로고    scopus 로고
    • Sqlrand: Preventing SQL injection attacks
    • BOYD, S. W., AND KEROMYTIS, A. D. Sqlrand: Preventing SQL injection attacks. In ACNS (2004), pp. 292-302.
    • (2004) ACNS , pp. 292-302
    • Boyd, S.W.1    Keromytis, A.D.2
  • 9
    • 77953855187 scopus 로고    scopus 로고
    • Using parse tree validation to prevent SQL injection attacks
    • 2005
    • BUEHRER, G., WEIDE, B. W., AND SIVILOTTI, P. A. G. Using parse tree validation to prevent SQL injection attacks. In SEM (2005).
    • SEM
    • Buehrer, G.1    Weide, B.W.2    Sivilotti, P.A.G.3
  • 10
    • 31344435513 scopus 로고    scopus 로고
    • Safe query objects: Statically typed objects as remotely executable queries
    • COOK, W. R., AND RAI, S. Safe query objects: statically typed objects as remotely executable queries. In ICSE (2005), pp. 97-106.
    • (2005) ICSE , pp. 97-106
    • Cook, W.R.1    Rai, S.2
  • 12
    • 77952407110 scopus 로고    scopus 로고
    • AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks
    • HALFOND, W., AND ORSO, A. AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks. In ASE (2005), pp. 174-183.
    • (2005) ASE , pp. 174-183
    • Halfond, W.1    Orso, A.2
  • 13
    • 34547379435 scopus 로고    scopus 로고
    • Using positive tainting and syntax-aware evaluation to counter SQL injection attacks
    • HALFOND, W., ORSO, A., AND MANOLIOS, P. Using Positive Tainting and Syntax-Aware Evaluation to Counter SQL Injection Attacks. In FSE (2006), pp. 175-185.
    • (2006) FSE , pp. 175-185
    • Halfond, W.1    Orso, A.2    Manolios, P.3
  • 14
    • 40449116802 scopus 로고    scopus 로고
    • A classification of SQL-injection attacks and countermeasures
    • HALFOND, W. G., VIEGAS, J., AND ORSO, A. A Classification of SQL-Injection Attacks and Countermeasures. In SSSE (2006).
    • (2006) SSSE
    • Halfond, W.G.1    Viegas, J.2    Orso, A.3
  • 15
    • 77952339846 scopus 로고    scopus 로고
    • Secureworks press release. Internet news report, July
    • Secureworks press release. Internet news report, July 2006. http://www.secureworks.com/press/20060718-sql.html.
    • (2006)
  • 16
    • 84923564816 scopus 로고    scopus 로고
    • Finding security vulnerabilities in Java applications with static analysis
    • LIVSHITS, V. B., AND LAM, M. S. Finding security vulnerabilities in Java applications with static analysis. In USENIX Security Symposium (2005).
    • (2005) USENIX Security Symposium
    • Livshits, V.B.1    Lam, M.S.2
  • 17
    • 33244471315 scopus 로고    scopus 로고
    • SQL DOM: Compile time checking of dynamic SQL statements
    • MCCLURE, R. A., AND KRÜGER, I. H. SQL DOM: compile time checking of dynamic SQL statements. In ICSE (2005), pp. 88-96.
    • (2005) ICSE , pp. 88-96
    • McClure, R.A.1    Krüger, I.H.2
  • 19
    • 84871349041 scopus 로고    scopus 로고
    • Automatically hardening web applications using precise tainting
    • NGUYEN-TUONG, A., GUARNIERI, S., GREENE, D., SHIRLEY, J., AND EVANS, D. Automatically hardening web applications using precise tainting. In SEC (2005), pp. 295-308.
    • (2005) SEC , pp. 295-308
    • Nguyen-Tuong, A.1    Guarnieri, S.2    Greene, D.3    Shirley, J.4    Evans, D.5
  • 21
    • 33745213901 scopus 로고    scopus 로고
    • Defending against injection attacks through context-sensitive string evaluation
    • PIETRASZEK, T., AND BERGHE, C. V. Defending against injection attacks through context-sensitive string evaluation. In RAID (2005).
    • (2005) RAID
    • Pietraszek, T.1    Berghe, C.V.2
  • 22
    • 51749106501 scopus 로고    scopus 로고
    • Language-based information-flow security
    • SABELFELD, A., AND MYERS, A. C. Language-based information-flow security. IEEE JSA, (2003).
    • (2003) IEEE JSA
    • Sabelfeld, A.1    Myers, A.C.2
  • 24
    • 33745216482 scopus 로고    scopus 로고
    • The essence of command injection attacks in web applications
    • SU, Z., AND WASSERMANN, G. The essence of command injection attacks in web applications. In POPL (2006), pp. 372-382.
    • (2006) POPL , pp. 372-382
    • Su, Z.1    Wassermann, G.2
  • 25
    • 77949457347 scopus 로고    scopus 로고
    • Internet, September
    • Dark reading security analysis. Internet, September 2006. http://www.darkreading.com/document.asp? doc-id=103774&WT.svl=news1-3.
    • (2006) Dark Reading Security Analysis
  • 26
    • 26444575798 scopus 로고    scopus 로고
    • A learning-based approach to the detection of SQL attacks
    • Detection of Instructions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005. Proceedings
    • VALEUR, F., MUTZ, D., AND VIGNA, G. A learning-based approach to the detection of SQL attacks. In DIMVA (2005), pp. 123-140. (Pubitemid 41423153)
    • (2005) Lecture Notes in Computer Science , vol.3548 , pp. 123-140
    • Valeur, F.1    Mutz, D.2    Vigna, G.3
  • 28
    • 24644493674 scopus 로고    scopus 로고
    • Mining temporal specifications for error detection
    • WEIMER, W., AND NECULA, G. C. Mining temporal specifications for error detection. In TACAS (2005), pp. 461-476.
    • (2005) TACAS , pp. 461-476
    • Weimer, W.1    Necula, G.C.2
  • 29
    • 84910681237 scopus 로고    scopus 로고
    • Static detection of security vulnerabilities in scripting languages
    • XIE, Y., AND AIKEN, A. Static detection of security vulnerabilities in scripting languages. In USENIX Security Symposium (2006).
    • (2006) USENIX Security Symposium
    • Xie, Y.1    Aiken, A.2
  • 30
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • XU, W., BHATKAR, S., AND SEKAR, R. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In 15th USENIX Security Symposium (2006).
    • (2006) 15th USENIX Security Symposium
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.