Academic literature on the topic 'Sql-injection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Sql-injection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Sql-injection"

1

Bisson, R. "SQL injection." ITNOW 47, no. 2 (2005): 25. http://dx.doi.org/10.1093/itnow/bwi039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shar, Lwin Khin, and Hee Beng Kuan Tan. "Defeating SQL Injection." Computer 46, no. 3 (2013): 69–77. http://dx.doi.org/10.1109/mc.2012.283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wrightes, Jene. "SQL injection attacks." Advances in Engineering Innovation 2, no. 1 (2023): 26–31. http://dx.doi.org/10.54254/2977-3903/2/2023017.

Full text
Abstract:
SQL Injection (SQLi) attacks continue to pose significant threats to modern web applications, compromising data integrity and confidentiality. This research delves into the development and evaluation of methodologies designed to detect and mitigate these malicious attacks. Employing a diverse set of web applications, the study unfolds in a controlled environment, simulating real-world conditions to assess the effectiveness of current defense mechanisms against SQLi. Building upon this baseline, the research introduces a two-pronged defense mechanism: a Static Analysis Tool to pre-emptively ide
APA, Harvard, Vancouver, ISO, and other styles
4

Nagpal, Bharti, Naresh Chauhan, and Nanhay Singh. "A Viable Solution to Prevent SQL Injection Attack Using SQL Injection." i-manager's Journal on Computer Science 3, no. 3 (2015): 5–10. http://dx.doi.org/10.26634/jcom.3.3.3660.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mr., Vishal Andodariya. "SQL Injection Attack Detection and Prevention Techniques to Secure Web Site." International Journal of Trend in Scientific Research and Development 2, no. 4 (2019): 624–28. https://doi.org/10.31142/ijtsrd13034.

Full text
Abstract:
Structured Query Language SQL Injection is a code injection technique that exploits security vulnerability occurring in database layer of web applications 8 . According to Open Web Application Security Projects OWASP , SQL Injection is one of top 10 web based attacks 10 . This paper shows the basics of SQL Injection attack, types of SQL Injection Attack according to their classification. It also describes the survey of different SQL Injection attack detection and prevention. At the end of this paper, the comparison of different SQL Injection Attack detection and prevention is shown. Mr. Vishal
APA, Harvard, Vancouver, ISO, and other styles
6

Kusuma, Gregorius Hendy. "Analysis of SQL Injection Attacks on Website Service." bit-Tech 1, no. 1 (2018): 26–33. http://dx.doi.org/10.32877/bt.v1i1.3.

Full text
Abstract:
Among the various types of software vulnerabilities, command injection is the most common type of threat in web applications. In command injection, SQL injection type of attacks areextremely prevalent, and ranked as the second most common form of attack on web. SQL injection attacks involve the construction of application’s input data that will result in the execution of malicious SQL statements. Most of the SQL injection detection techniques involve the code to be written along with the actual scripting code. These techniques do not detect errors in SQL statements. Hence, this paper proposes
APA, Harvard, Vancouver, ISO, and other styles
7

Mohd Yunus, Mohd Amin, Muhammad Zainulariff Brohan, Nazri Mohd Nawi, Ely Salwana Mat Surin, Nurhakimah Azwani Md Najib, and Chan Wei Liang. "Review of SQL Injection : Problems and Prevention." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (2018): 215. http://dx.doi.org/10.30630/joiv.2.3-2.144.

Full text
Abstract:
SQL injection happened in electronic records in database and it is still exist even after two decades since it first happened. Most of the web-based applications are still vulnerable to the SQL injection attacks. Although technology had improved a lot during these past years, but, hackers still can find holes to perform the SQL injection. There are many methods for this SQL injection to be performed by the hackers and there is also plenty of prevention for the SQL injection to be happened. The vulnerability to SQL injection is very big and this is definitely a huge threat to the web based appl
APA, Harvard, Vancouver, ISO, and other styles
8

Dalai, Asish Kumar, and Sanjay Kumar Jena. "Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications." Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/3825373.

Full text
Abstract:
Reports on web application security risks show that SQL injection is the top most vulnerability. The journey of static to dynamic web pages leads to the use of database in web applications. Due to the lack of secure coding techniques, SQL injection vulnerability prevails in a large set of web applications. A successful SQL injection attack imposes a serious threat to the database, web application, and the entire web server. In this article, the authors have proposed a novel method for prevention of SQL injection attack. The classification of SQL injection attacks has been done based on the met
APA, Harvard, Vancouver, ISO, and other styles
9

Shalawati, Wa Ode Hardianas, Muh. Yamin, and Natalis Ransi. "IMPLEMENTASI TEKNOLOGI ENKRIPSI URL (UNIFORM RESOURCE LOCATOR) DAN LOGIN FORM MENGGUNAKAN ALGORITMA BLOWFISH UNTUK MENCEGAH SERANGAN SQL INJECTION." semanTIK 5, no. 2 (2019): 273–82. https://doi.org/10.5281/zenodo.3510178.

Full text
Abstract:
<em>Security of a website is a very important aspect.</em><em> Because unsafe websites will easily be damaged the integrity of the data and information through various attack</em><em>. SQL Injection is one type of attack that often occurs on websites. SQL Injection is a method for entering SQL commands as an input through a web to get database access. Insecure URLs and Login forms are often targeted by SQL Injection attacks to exploit web databases. There are many ways to prevent SQL Injection attacks and one of them uses cryptographic techniques to encrypt URLs and Login Forms of websites int
APA, Harvard, Vancouver, ISO, and other styles
10

JANG, Young-Su. "Detection of SQL Injection Vulnerability in Embedded SQL." IEICE Transactions on Information and Systems E103.D, no. 5 (2020): 1173–76. http://dx.doi.org/10.1587/transinf.2019edl8143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Sql-injection"

1

Aryal, Dhiraj, and Anup Shakya. "A Taxonomy of SQL Injection Defense Techniques." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3076.

Full text
Abstract:
Context: SQL injection attack (SQLIA) poses a serious defense threat to web applications by allowing attackers to gain unhindered access to the underlying databases containing potentially sensitive information. A lot of methods and techniques have been proposed by different researchers and practitioners to mitigate SQL injection problem. However, deploying those methods and techniques without a clear understanding can induce a false sense of security. Classification of such techniques would provide a great assistance to get rid of such false sense of security. Objectives: This paper is focused
APA, Harvard, Vancouver, ISO, and other styles
2

Bahureková, Beáta. "Technika SQL injection - její metody a způsoby ochrany." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2020. http://www.nusl.cz/ntk/nusl-433304.

Full text
Abstract:
SQL injection is a technique directed against web applications using an SQL database, which can pose a huge security risk. It involves inserting code into an SQL database, and this attack exploits vulnerabilities in the database or application layer. The main goal of my thesis is to get acquainted with the essence of SQL injection, to understand the various methods of this attack technique and to show ways to defend against it. The work can be divided into these main parts, which I will discuss as follows.In the introductory part of the work I mention the theoretical basis concerning SQL injec
APA, Harvard, Vancouver, ISO, and other styles
3

Cetin, Cagri. "Authentication and SQL-Injection Prevention Techniques in Web Applications." Scholar Commons, 2019. https://scholarcommons.usf.edu/etd/7766.

Full text
Abstract:
This dissertation addresses the top two “most critical web-application security risks” by combining two high-level contributions. The first high-level contribution introduces and evaluates collaborative authentication, or coauthentication, a single-factor technique in which multiple registered devices work together to authenticate a user. Coauthentication provides security benefits similar to those of multi-factor techniques, such as mitigating theft of any one authentication secret, without some of the inconveniences of multi-factor techniques, such as having to enter passwords or biometrics.
APA, Harvard, Vancouver, ISO, and other styles
4

Sjöström, Linus. "Detecting SQL Injection Attacks in VoIP using Real-time Deep Packet Inspection : Can a Deep Packet Inspection Firewall Detect SQL Injection Attacks on SIP Traffic with Reasonable Performance?" Thesis, Linköpings universitet, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161072.

Full text
Abstract:
The use of the Internet has increased over the years, and it is now an integral part of our daily activities, as we often use it for everything from interacting on social media to watching videos online. Phone calls nowadays tend to use Voice over IP (VoIP), rather than the traditional phone networks. As with any other services using the Internet, these calls are vulnerable to attacks. This thesis focus on one particular attack: SQL injection in the Session Initial Protocol (SIP), where SIP is a popular protocol used within VoIP. To find different types of SQL injection, two classifiers are im
APA, Harvard, Vancouver, ISO, and other styles
5

Trumble, Brandon. "Using Code Inspection, Code Modification, and Machine Learning to prevent SQL Injection." Thesis, Kutztown University of Pennsylvania, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1590429.

Full text
Abstract:
<p> Modern day databases store invaluable information about everyone. This information is assumed to be safe, secure, and confidential. However, as technology has become more widespread, more people are able to abuse and exploit this information for personal gain. While the ideal method to combat this issue is the enhanced education of developers, that still leaves a large amount of time where this information is insecure. This thesis outlines two potential solutions to the problem that SQL Injection presents in the context of databases. The first modifies an existing code base to use saf
APA, Harvard, Vancouver, ISO, and other styles
6

Uwagbole, Solomon. "A pattern-driven corpus to predictive analytics in mitigating SQL injection attack." Thesis, Edinburgh Napier University, 2018. http://researchrepository.napier.ac.uk/Output/1538260.

Full text
Abstract:
The back-end database provides accessible and structured storage for each web application's big data internet web traffic exchanges stemming from cloud-hosted web applications to the Internet of Things (IoT) smart devices in emerging computing. Structured Query Language Injection Attack (SQLIA) remains an intruder's exploit of choice to steal confidential information from the database of vulnerable front-end web applications with potentially damaging security ramifications. Existing solutions to SQLIA still follows the on-premise web applications server hosting concept which were primarily dev
APA, Harvard, Vancouver, ISO, and other styles
7

Gopali, Gopali. "Protecting Web Applications from SQL Injection Attacks- Guidelines for Programmers Master Thesis." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20238.

Full text
Abstract:
Injektionsattack är den mest kritiska säkerhetsapplikationen för webbapplikationer, och SQL-injektion (SQLi) -attack är den mest rapporterade injektionsattacken på webbapplikationer. I denna avhandling har vi identifierat angreppsteknikerna som används av angripare och vi ger också riktlinjer så att programmerarna kan skriva webbapplikationskoder på ett säkert sätt för att förhindra SQLi-attackerna.Metoden som tillämpas för forskningen är litteraturstudie och vi använde vägen bevis genom demonstration för att få den tydliga bilden. Det första steget var att ta reda på kodningsfelen, då utforma
APA, Harvard, Vancouver, ISO, and other styles
8

Pandey, Amit Kumar. "Securing Web Applications From Application-Level Attack." Kent State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=kent1181098075.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Norström, Alexander. "Measuring Accurancy of Vulnerability Scanners : An Evaluation with SQL Injections." Thesis, Linköpings universitet, Informationskodning, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-106628.

Full text
Abstract:
Web application vulnerabilities of critical are commonly found in web applications. The arguably most problematic class of web application vulnerabilities is SQL injections. SQL injection vulnerabilities can be used to execute commands on the database coupled to the web application, e.g., to extract the web application’s user and passwords data. Black box testing tools are often used (both by system owners and their adversaries) to discover vul- nerabilities in a running web application. Hence, how well they perform at discovering SQL injection vulnerabilities is of importance. This thesis des
APA, Harvard, Vancouver, ISO, and other styles
10

Scholte, Theodoor. "Amélioration de la sécurité par la conception des logiciels web." Thesis, Paris, ENST, 2012. http://www.theses.fr/2012ENST0024/document.

Full text
Abstract:
L'internet est devenu un environnement omniprésent dans le monde du travail et du loisir. La popularité sans cesse croissante des applications web ainsi que des services associés entraînent l'exécution de nombreuses transactions critiques, qui soulèvent des questions de sécurité. Du fait de cette croissance, des efforts ont été entrepris durant cette dernière décennie pour rendre les applications web plus sûres. Malgré ces efforts, de récents rapports provenant de l'institut SANS estiment que plus de 60 % des attaques commises sur l'Internet ciblent les applications web en se concentrant sur l
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Sql-injection"

1

Gupta, Sunil. SQL Injection Attacks. Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6505-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wassermann, Tobias. Sichere Webanwendungen mit PHP: [Sicherheit mit PHP, MySQL, Apache, JavaScript, AJAX ; sichere Sessions und Uploads, Lösungen gegen SQL-Injection und Cross-Site Scripting ; Umgang mit sensitiven Daten, Verschlüsselung und Authentifizierung mit SSL]. Mitp, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

SQL Injection Defenses. O'Reilly Media, Incorporated, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

SQL injection attacks and defense. Syngress Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

SQL Injection Attacks and Defense. Elsevier, 2009. http://dx.doi.org/10.1016/b978-1-59749-424-3.x0001-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

SQL injection attacks and defense. 2nd ed. Elsevier, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Clarke, Justin. SQL Injection Attacks and Defense. Elsevier Science & Technology Books, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

SQL injection attacks and defense. Syngress Pub., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Teckchandani, Tanmay. SQL Injection Attacks and Mitigations. GRIN Verlag GmbH, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hacking de Aplicaciones Web - SQL Injection. ZEROXWORD COMPUTING, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Sql-injection"

1

Adams, Ralf. "SQL Injection." In SQL, 4th ed. Carl Hanser Verlag GmbH & Co. KG, 2021. http://dx.doi.org/10.3139/9783446472204.025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Carter, Peter A. "SQL Injection." In Securing SQL Server. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-4161-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Snyder, Chris, Thomas Myer, and Michael Southwell. "Preventing SQL Injection." In Pro PHP Security. Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-3319-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Orso, Alessandro. "SQL Injection Attacks." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Orso, Alessandro. "SQL Injection Attacks." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pollack, Edward. "Protecting Against SQL Injection." In Dynamic SQL. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1811-2_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pollack, Edward. "Protecting Against SQL Injection." In Dynamic SQL. Apress, 2018. http://dx.doi.org/10.1007/978-1-4842-4318-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Boyd, Stephen W., and Angelos D. Keromytis. "SQLrand: Preventing SQL Injection Attacks." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-24852-1_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ahuja, Bharat Kumar, Angshuman Jana, Ankit Swarnkar, and Raju Halder. "On Preventing SQL Injection Attacks." In Advances in Intelligent Systems and Computing. Springer India, 2015. http://dx.doi.org/10.1007/978-81-322-2650-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sinha, Sanjib. "Finding HTML and SQL Injection Vulnerabilities." In Bug Bounty Hunting for Web Security. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5391-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Sql-injection"

1

Harve, Bindu Mohan, Manjunatha Sughaturu Krishnappa, Vivekananda Jayaram, et al. "Mitigating SQL Injection Vulnerabilities with Oracle 23c SQL Firewall." In 2024 First International Conference on Data, Computation and Communication (ICDCC). IEEE, 2024. https://doi.org/10.1109/icdcc62744.2024.10961621.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

V, Sathya, Anirutth SA, and Mohamed Safresh H. "Survey on Prevention of SQL Injection." In 2024 International Conference on Smart Technologies for Sustainable Development Goals (ICSTSDG). IEEE, 2024. https://doi.org/10.1109/icstsdg61998.2024.11026349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

T, Subbulakshmi, Josiga S, Brindha S, Jishnu S, and Adityan Sunil Kumar. "SQL Injection Testing on Website using Sqlmap." In 2024 International Conference on Trends in Quantum Computing and Emerging Business Technologies (TQCEBT). IEEE, 2024. http://dx.doi.org/10.1109/tqcebt59414.2024.10545289.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Voitovych, O. P., O. S. Yuvkovetskyi, and L. M. Kupershtein. "SQL injection prevention system." In 2016 International Conference "Radio Electronics & Info Communications" (UkrMiCo). IEEE, 2016. http://dx.doi.org/10.1109/ukrmico.2016.7739642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Alsobhi, Hanan, and Reem Alshareef. "SQL Injection Countermeasures Methods." In 2020 International Conference on Computing and Information Technology (ICCIT-1441). IEEE, 2020. http://dx.doi.org/10.1109/iccit-144147971.2020.9213748.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cetin, Cagri, Dmitry Goldgof, and Jay Ligatti. "SQL-Identifier Injection Attacks." In 2019 IEEE Conference on Communications and Network Security (CNS). IEEE, 2019. http://dx.doi.org/10.1109/cns.2019.8802743.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sadeghian, Amirmohammad, Mazdak Zamani, and Suhaimi Ibrahim. "SQL Injection Is Still Alive: A Study on SQL Injection Signature Evasion Techniques." In 2013 International Conference on Informatics and Creative Multimedia (ICICM). IEEE, 2013. http://dx.doi.org/10.1109/icicm.2013.52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rai, Aditya, MD Mazharul Islam Miraz, Deshbandhu Das, Harpreet Kaur, and Swati. "SQL Injection: Classification and Prevention." In 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM). IEEE, 2021. http://dx.doi.org/10.1109/iciem51511.2021.9445347.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kaur, Pankajdeep, and Kanwal Preet Kour. "SQL injection: Study and augmentation." In 2015 International Conference on Signal Processing, Computing and Control (ISPCC). IEEE, 2015. http://dx.doi.org/10.1109/ispcc.2015.7375006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Priyaa, B. Deva, and M. Indra Devi. "Hybrid SQL injection detection system." In 2016 3rd International Conference on Advanced Computing and Communication Systems (ICACCS ). IEEE, 2016. http://dx.doi.org/10.1109/icaccs.2016.7586332.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Sql-injection"

1

Orso, Alessandro, Wenke Lee, and Adam Shostack. Preventing SQL Code Injection by Combining Static and Runtime Analysis. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada482932.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bri Rolston. Attack methodology Analysis: SQL Injection Attacks and Their Applicability to Control Systems. Office of Scientific and Technical Information (OSTI), 2005. http://dx.doi.org/10.2172/911631.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!