Results 151 to 160 of about 10,646 (208)

SQL-Identifier Injection Attacks

2019 IEEE Conference on Communications and Network Security (CNS), 2019
This paper defines a class of SQL-injection attacks that are based on injecting identifiers, such as table and column names, into SQL statements. An automated analysis of GitHub shows that 15.7% of 120,412 posted Java source files contain code vulnerable to SQL-Identifier Injection Attacks (SQL-IDIAs).
Dmitry B Goldgof, Jay Ligatti
exaly   +2 more sources

SQL Injection Attacks and Prevention

2023 6th International Conference on Information Systems and Computer Networks (ISCON), 2023
Kashish Gaur   +5 more
exaly   +2 more sources

SQL injection attacks

Advances in Engineering Innovation, 2023
SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks.
openaire   +1 more source

SQL injection attacks with the AMPA suite

International Journal of Electronic Security and Digital Forensics, 2013
The suite of tools presented here was developed to exploit the lack of sanitisation found in user inputs that reached a target database and sometimes even the server. The focus for the design of the tools was a BLIND SQL injection, the verbosity of the attack and the possibility to inject a web shell which enabled Meterpreter to open a reverse ...
Simone Cecchini, Diane Gan
openaire   +1 more source

Testing Snort with SQL Injection Attacks

Proceedings of the Ninth International C* Conference on Computer Science & Software Engineering - C3S2E '16, 2016
Currently, information security is a significant challenge in the information era because businesses store critical information in databases. Therefore, databases need to be a secure component of an enterprise. Organizations use Intrusion Detection Systems (IDS) as a security infrastructure component, of which a popular implementation is Snort. In this
Rui Silva   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy