期刊文献+

基于Chopping的Web应用SQL注入漏洞检测方法 被引量:3

Web Application SQL Injection Detection Method Based on Chopping
下载PDF
导出
摘要 随着Web应用的不断普及,其安全问题越来越显突出,特别是SQL注入漏洞攻击,给用户的安全体验造成了巨大的威胁.针对二阶SQL注入漏洞,本文提出了一种基于chopping技术的二阶SQL注入漏洞检测方法.首先通过对待测应用程序进行chopping,获取到一阶SQL注入疑似路径;然后对一阶SQL注入疑似路径中的SQL语句进行分析,确定二阶SQL注入操作对,进而得到二阶SQL注入疑似路径;最后通过构造攻击向量并运行,确认二阶SQL注入疑似路径中漏洞是否实际存在.实验结果表明,本方法能够有效地检测出二阶SQL注入漏洞. With the wide use of Web application in recent years, its security has seriously affected the experience of relevant users. In particular, the SQL injection vulnerability attack is the most commonly used technique in attacking Web applications. In this study, a chopping-based method is proposed to detect the second-order SQL injection. Firstly, the static analysis based on chopping had been used to find the suspected first-order SQL injection paths. Secondly, the SQL statements in those suspected paths should be used to get the second-order operation pairs, which had been used to get the suspected second-order SQL injection paths. Finally, the attack vector is constructed to confirm the existence of the vulnerabilities which are hiding in Web applications. The experimental results show that the method we propose in this study can effectively detect the second-order SQL injection vulnerabilities thus prevent Web applications from SQL iniection attack.
出处 《计算机系统应用》 2018年第1期86-91,共6页 Computer Systems & Applications
基金 国家自然科学基金(61672085 61472025)
关键词 二阶SQL注入 污点分析 WEB应用 漏洞检测 CHOPPING 程序切片 second-order SQL injection taint analysis Web application vulnerability detection chopping programslicing
  • 相关文献

参考文献1

二级参考文献6

  • 1DeKeukelaereF,AllanD,BueckerA.利用IBMRationalAppScan改进Web应用软件开发生命周期的安全性.IBMRedboooks,2010.1-35.
  • 2SantiagoCE,HondoM.Web2.0桌面与移动应用程序安全性设计.IBMdeveloperWorks,2012.1-10.
  • 3赵静.Web2.0应用安全深入解析:企业级Web2.0应用安全解决方案.IBMdeveloperWorks.2009.1-9.
  • 4OWASP. OWASP Top 1-2010 The Ten Most Critical Web Application Security Risks,2011.1-22.
  • 5肖国一.Web应用安全利:IBMRationalAppScan.IBMdeveloperWorks,2010.1-5.
  • 6DanahyJ.策划安全策略:应询问的三个核心问题.IBMdeveloperWorks,2009.1-3.

共引文献6

同被引文献10

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部