DocumentCode
2695794
Title
Runtime monitors for tautology based SQL injection attacks
Author
Dharam, Ramya ; Shiva, Sajjan G.
Author_Institution
Comput. Sci. Dept., Univ. of Memphis, Memphis, TN, USA
fYear
2012
fDate
26-28 June 2012
Firstpage
253
Lastpage
258
Abstract
Increased usage of web applications in recent years has emphasized the need to achieve (i) confidentiality, (ii) integrity, and (iii) availability of web applications. Backend database being the main target for external attacks such as SQL Injection Attacks, there is an emerging need to handle such attacks to secure stored information. Pre-deployment testing alone does not ensure complete security and hence post-deployment monitoring of web applications during its interaction with the external world can help us to handle SQL Injection Attacks in a better way. In this paper, we present a framework which can be used to handle tautology based SQL Injection Attacks using post-deployment monitoring technique. Our framework uses two pre-deployment testing techniques i.e. basis path and data flow testing techniques to identify legal execution paths of the software. Runtime monitors are then developed and integrated to observe the behavior of the software for identified execution paths such that their violation will help to detect and prevent tautology based SQL Injection Attacks.
Keywords
Internet; SQL; data flow analysis; data integrity; safety-critical software; Web application availability; backend database; basis path techniques; data confidentiality; data flow testing technique; data integrity; legal execution path; post-deployment monitoring technique; predeployment testing technique; runtime monitors; stored information security; tautology based SQL injection attacks; Databases; Games; Monitoring; Runtime; Security; Software; Testing; Data Flow Testing; Path Testing; Post-deployment Monitoring; Runtime Monitors; SQL Injection Attacks (SQLIAs); Tautology;
fLanguage
English
Publisher
ieee
Conference_Titel
Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on
Conference_Location
Kuala Lumpur
Print_ISBN
978-1-4673-1425-1
Type
conf
DOI
10.1109/CyberSec.2012.6246104
Filename
6246104
Link To Document