Indian Journal of Science and Technology
Year: 2016, Volume: 9, Issue: 28, Pages: 1-7
Kabir Umar1,2*, Abu Bakar Md Sultan1 , Hazura Zulzalil1 , Novia Admodisastro1 , and Mohd Taufik Abdullah1
1 Faculty of Computer Science and Information Technology,
2 Faculty of Computer Science and Information Technology,
*Author for correspondence
Faculty of Computer Science and Information Technology
SQL injection Hotspots (SQLiHs) are Application’s Entry Points (AEPs) through which SQL injection is possible, subject to the application’s internal sanitization or validation capabilities. Since not all AEPs are SQLiHs, one serious challenge during testing of very large web application for detection of SQL Injection Vulnerabilities (SQLIVs) is how to reliably decide which AEPs to consider for the test and which AEPs are unnecessary? In this paper, we propose a new Pushdown Automaton (PDA) based static analysis technique for detection of SQLiHs in web applications. The goal is to produce concrete information that can reliably and confidently guide both human tester/developer and SQLIVs detection tools/techniques as to which part of the source code to concentrate their efforts during detection and fixing of SQL injection flaws in an application. The proposed technique is an integral part of an on-going research on automated method for detection and removal of SQLIVs in web application. Experimental evaluation of the method is in progress. However, preliminary results show that the proposed technique is both feasible and effective.
Keywords: Context Free Grammar, Data Flow Path, Sensitive Sink, Vulnerabilities
Subscribe now for latest articles and news.