Results 31 to 40 of about 1,544,911 (270)
Web Application Penetration Testing Using SQL Injection Attack
A web application is a very important requirement in the information and digitalization era. With the increasing use of the internet and the growing number of web applications, every web application requires an adequate security level to store ...
Alde Alanda +4 more
doaj +1 more source
Research on the SQL injection filtering based on SQL syntax tree
The development of Web application make its areas become more and more widely.Followed by a security problem is becoming more and more serious,especially for the SQL injection attacks,which bring a huge challenge to the Web application security.A new SQL
Chen-wang HAN, Hui LIN, Chuan HUANG
doaj +3 more sources
DETECTION OF SQL INJECTION VULNERABILITY IN CODEIGNITER FRAMEWORK USING STATIC ANALYSIS
QL Injection attacks are still one type of attack that often occurs in web-based applications. The causes and ways to prevent SQL Injection have been widely explained in various sources.
Muhammad Fahmi Al Azhar, Ruki Harwahyu
doaj +1 more source
Analysis of SQL Injection Attacks on Website Service [PDF]
Among the various types of software vulnerabilities, command injection is the most common type of threat in web applications. In command injection, SQL injection type of attacks areextremely prevalent, and ranked as the second most common form of attack ...
Kusuma, G. H. (Gregorius)
core +2 more sources
Escrow: A large-scale web vulnerability assessment tool [PDF]
The reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well.
Delamore, Baden, Ko, Ryan K.L.
core +2 more sources
SQL Injection Attack Detection using Machine Learning Algorithms
SQL Injection is one of the most common vulnerabilities exploited for both privacy breaches and financial damage. It remains the top vulnerability on the most recent OWASP Top 10 list, with the number of such attacks on the rise.
Laila Aburashed +2 more
openalex +3 more sources
PachyRand: SQL Randomization for the PostgreSQL JDBC Driver [PDF]
Many websites are driven by web applications that deliver dynamic content stored in SQL databases. Such systems take input directly from the client via HTML forms.
Keromytis, Angelos D. +1 more
core +2 more sources
SQL Injection attack roadmap and fusion [PDF]
With SQL Injection, an attacker can change the intended effect of dynamically generated query in a web Application. This can lead to unauthorized access to the database underlying web application, and harmful transactions on the potentially sensitive ...
Abdullah @ Selimun, Mohd Taufik +4 more
core +1 more source
Implementasi Web Application Firewall Dalam Mencegah Serangan SQL Injection Pada Website
Dalam beberapa tahun terakhir perkembangan teknologi informasi menjadi semakin pesat, perkembangan ini membuat segala aktifitas dan pekerjaan menjadi lebih mudah, seperti halnya untuk mengakses berita maupun informasi.
Bangkit Wiguna +2 more
doaj +1 more source
SQL Vulnerability Detection System for PHP Program [PDF]
Aiming at PHP program,this paper proposes an Structured Query Language(SQL) vulnerability detection method based on the injection analysis technology.This method makes a detailed analysis on the injection in the aspects of data flow and program behavior ...
WANG Yaohui,WANG Dan,FU Lihua
doaj +1 more source

