Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A heuristic-based approach for detecting SQL-injection vulnerabilities in Web applications
Ciampa A., Visaggio C., Di Penta M.  SESS 2010 (Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems, Cape Town, South Africa, May 2, 2010)43-49.2010.Type:Proceedings
Date Reviewed: Sep 7 2010

SQL injection is one of the most common methodologies for hacking ill-developed Web applications. This fine paper describes a recently created tool for performing SQL injection for penetration testing purposes.

Fault injection into systems and response monitoring is a general methodology for security assessment, for large organizations and for software quality and security analysis. SQL injection falls in this category. In broad terms, it happens when a specific text input is entered into a Web form that passes through to the back-end SQL Server and escapes the normal data handling, forcing the server to perform outside the normal application specifications. Furthermore, sometimes the errors returned by the SQL Server also provide information, so that subsequent injections do even more harm.

The so-called V1p3R (viper) tool presented in this paper, instead of randomly and exhaustively creating the text inputs that correspond to the SQL queries that usually expose the vulnerabilities, which is time consuming and inexact, has a smart engine that goes deeper than the brute force approach. Ciampa, Visaggio, and Di Penta nicely describe the viper’s structure and present some preliminary statistics that compare its effectiveness with other well-known tools. The results favor the viper tool’s performance, both in speed and in number of vulnerabilities detected. This is not surprising from a tool that incorporates intelligence in the form of a database of errors, a database of SQL strings, a Web crawler engine, a pattern matching manager, and, of course, the injector itself.

Both the paper and the presented tool will be useful to Web developers.

Reviewer:  Constantin S. Chassapis Review #: CR138365 (1108-0839)
Bookmark and Share
 
Testing And Debugging (D.2.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Testing And Debugging": Date
Software defect removal
Dunn R., McGraw-Hill, Inc., New York, NY, 1984. Type: Book (9789780070183131)
Mar 1 1985
On the optimum checkpoint selection problem
Toueg S., Babaoglu O. SIAM Journal on Computing 13(3): 630-649, 1984. Type: Article
Mar 1 1985
Software testing management
Royer T., Prentice-Hall, Inc., Upper Saddle River, NJ, 1993. Type: Book (9780135329870)
Mar 1 1994
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy