A Static Analysis Framework For Detecting SQL Injection Vulnerabilities

  • Authors:
  • Xiang Fu;Xin Lu;Boris Peltsverger;Shijun Chen;Kai Qian;Lixin Tao

  • Affiliations:
  • Georgia Southwestern State University, Americus, GA;Georgia Southwestern State University, Americus, GA;Georgia Southwestern State University, Americus, GA;Georgia Southwestern State University, Americus, GA;Southern Polytechnic State University,Marietta, GA;Pace University, Pleasantville, NY

  • Venue:
  • COMPSAC '07 Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 01
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recently SQL Injection Attack (SIA) has become a major threat to Web applications. Via carefully crafted user input, attackers can expose or manipulate the back-end database of a Web application. This paper proposes the construction and outlines the design of a static analysis framework (called SAFELI) for identifying SIA vulnerabilities at compile time. SAFELI statically inspects MSIL bytecode of an ASP.NET Web application, using symbolic execution. At each hotspot that submits SQL query, a hybrid constraint solver is used to find out the corresponding user input that could lead to breach of information security. Once completed, SAFELI has the future potential to discover more delicate SQL injection attacks than black-box Web security inspection tools.