• DocumentCode
    2695794
  • Title

    Runtime monitors for tautology based SQL injection attacks

  • Author

    Dharam, Ramya ; Shiva, Sajjan G.

  • Author_Institution
    Comput. Sci. Dept., Univ. of Memphis, Memphis, TN, USA
  • fYear
    2012
  • fDate
    26-28 June 2012
  • Firstpage
    253
  • Lastpage
    258
  • Abstract
    Increased usage of web applications in recent years has emphasized the need to achieve (i) confidentiality, (ii) integrity, and (iii) availability of web applications. Backend database being the main target for external attacks such as SQL Injection Attacks, there is an emerging need to handle such attacks to secure stored information. Pre-deployment testing alone does not ensure complete security and hence post-deployment monitoring of web applications during its interaction with the external world can help us to handle SQL Injection Attacks in a better way. In this paper, we present a framework which can be used to handle tautology based SQL Injection Attacks using post-deployment monitoring technique. Our framework uses two pre-deployment testing techniques i.e. basis path and data flow testing techniques to identify legal execution paths of the software. Runtime monitors are then developed and integrated to observe the behavior of the software for identified execution paths such that their violation will help to detect and prevent tautology based SQL Injection Attacks.
  • Keywords
    Internet; SQL; data flow analysis; data integrity; safety-critical software; Web application availability; backend database; basis path techniques; data confidentiality; data flow testing technique; data integrity; legal execution path; post-deployment monitoring technique; predeployment testing technique; runtime monitors; stored information security; tautology based SQL injection attacks; Databases; Games; Monitoring; Runtime; Security; Software; Testing; Data Flow Testing; Path Testing; Post-deployment Monitoring; Runtime Monitors; SQL Injection Attacks (SQLIAs); Tautology;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on
  • Conference_Location
    Kuala Lumpur
  • Print_ISBN
    978-1-4673-1425-1
  • Type

    conf

  • DOI
    10.1109/CyberSec.2012.6246104
  • Filename
    6246104