Loading...

CERIAS Security: CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations 1/4

573 views

Loading...

Loading...

Transcript

The interactive transcript could not be loaded.

Loading...

Loading...

Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Apr 27, 2010

Clip 1/4
Speaker: Ventkat Venkatakrishnan · Assistant Professor · University of Illinois at Chicago

SQL injection attacks are one of the topmost threats for applications written for the Web. These attacks are launched through specially crafted user input on web applications that use low level string operations to construct SQL queries. In this talk, I will present a novel and powerful scheme for automatically transforming web applications to render them safe against all SQL injection attacks.

A characteristic diagnostic feature of SQL injection attacks is that they change the intended structure of queries issued. Our technique for detecting SQL injection is to dynamically mine the programmer-intended query structure on any input, and detect attacks by comparing it against the structure of the actual query issued. We propose a simple and novel mechanism for mining programmer intended queries by dynamically evaluating runs over benign candidate inputs.
This mechanism is theoretically well founded and is based on inferring intended queries by considering the symbolic query computed on a program run. Our approach has been implemented in a tool called CANDID that retrofits Web applications written in Java to defend them against SQL injection attacks. We report experimental results that show that our approach performs remarkably well in practice.
(Joint work with Sruthi Bandhakavi, Prithvi Bisht and P. Madhusudan)

For more information go to the Cerias website (http://bit.ly/dsFCBF)

Loading...


to add this to Watch Later

Add to

Loading playlists...