files/journal/2022-09-02_12-54-44-000000_354.png

Journal of Engineering and Applied Sciences

ISSN: Online 1818-7803
ISSN: Print 1816-949x
101
Views
0
Downloads

Evolutionary Search Method for Removal of SQL Injection Vulnerabilities

K. Umar, A.B. Sultan, H. Zulzalil, N. Admodisastro and M.T. Abdullah
Page: 7162-7170 | Received 21 Sep 2022, Published online: 21 Sep 2022

Full Text Reference XML File PDF File

Abstract

Existing literature focuses more on describing SQL Injection Attacks (SQLIAs) and less on describing SQL Injection Vulnerabilities (SQLIVs), even though, the former is carried out to exploit the later. This study describe root causes of SQLIVs and illustrates how SQLIVs could be exploited using different types of SQLIAs. The study, also, presents proposal of a new method for automated detection and removal of SQLIVs. The new method employs grammar reachability analysis to define enhanced static source code analysis for detection of SQLIVs and employs Evolutionary Programming (EP) search strategy to automate source code modification for removal of SQLIVs. Preliminary experimental results show that the new method is feasible and promising.


How to cite this article:

K. Umar, A.B. Sultan, H. Zulzalil, N. Admodisastro and M.T. Abdullah. Evolutionary Search Method for Removal of SQL Injection Vulnerabilities.
DOI: https://doi.org/10.36478/jeasci.2018.7162.7170
URL: https://www.makhillpublications.co/view-article/1816-949x/jeasci.2018.7162.7170