Taxonomy of attacks on web based applications

A Singh, A Sharma, N Sharma… - 2019 2nd …, 2019 - ieeexplore.ieee.org
Computers are being reasonably important part of our day to day lives. Important information
is being shared and received via web, which are now a day's very much vulnerable to …

SEPTIC: detecting injection attacks and vulnerabilities inside the DBMS

I Medeiros, M Beatriz, N Neves… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Databases continue to be the most commonly used backend storage in enterprises, but they
are often integrated with vulnerable applications, such as web frontends, which allow …

Security countermeasures in web based application

A Sharma, A Singh, N Sharma… - 2019 2nd …, 2019 - ieeexplore.ieee.org
With increase in use of internet, web-based applications are in high demand as they are
used for many applications. With increase in its use, it is becoming prone to a number of …

Input-based analysis approach to prevent SQL injection attacks

A Jana, P Bordoloi, D Maity - 2020 IEEE Region 10 Symposium …, 2020 - ieeexplore.ieee.org
SQL injection attack is one of the serious security threat for a database application. It permits
attackers to get unauthorized access to the database by inserting malicious SQL code into …

Analysis of SQL injection attack detection and prevention on MySQL database using input categorization and input verifier

AAS Arif, R Purwoko, N Qomariasih… - 2022 IEEE 8th …, 2022 - ieeexplore.ieee.org
Data leakage affects confidentiality and integrity, which can harm various parties. According
to OWASP (Open Web Application Security Project) research, SQL injection attacks rank first …

Code-based analysis approach to detect and prevent SQL injection attacks

A Jana, D Maity - 2020 11th International Conference on …, 2020 - ieeexplore.ieee.org
Now-a-days web applications are everywhere. Usually these applications are developed by
database program which are often written in popular host programming languages such as …

Hacking the DBMS to prevent injection attacks

I Medeiros, M Beatriz, N Neves, M Correia - Proceedings of the Sixth …, 2016 - dl.acm.org
After more than a decade of research, web application security continues to be a challenge
and the backend database the most appetizing target. The paper proposes preventing …

Defining abstract semantics for static dependence analysis of relational database applications

A Jana, R Halder - … Systems Security: 12th International Conference, ICISS …, 2016 - Springer
Dependence Graph provides the basis for powerful programming tools to address a large
number of software engineering activities including security analysis. This paper proposes a …

Confidentiality leakage analysis of database-driven applications

A Jana, A Kashyap - Advances in Computing and Data Sciences: 5th …, 2021 - Springer
In a software system the database technology is one of the most important part that stores
external information into the permanent storage and process them accordingly. However …

[PDF][PDF] Counterfactual Explanation of a Classification Model for Detecting SQL Injection Attacks

BA Cumi-Guzman, AD Espinosa-Chim… - 2024 - ceur-ws.org
In the realm of cybersecurity, accurately distinguishing between malicious and benign SQL
queries is a critical challenge that impacts database security. Addressing this challenge …