Volltext-Downloads (blau) und Frontdoor-Views (grau)
The search result changed since you submitted your search request. Documents might be displayed in a different sort order.
  • search hit 42 of 224
Back to Result List

Source code patterns of SQL injection vulnerabilities

  • Many secure software development methods and tools are well-known and understood. Still, the same software security vulnerabilities keep occurring. To find out if new source code patterns evolved or the same patterns are reoccurring, we investigate SQL injections in PHP open source projects. SQL injections are well-known and a core part of software security education. For each common part of SQL injections, the source code patterns are analysed. Examples are pointed out showing that developers had software security in mind, but nevertheless created vulnerabilities. A comparison to earlier work shows that some categories are not found as often as expected. Our main contribution is the categorization of source code patterns.

Export metadata

Additional Services

Search Google Scholar

Statistics

frontdoor_oas
Metadaten
Author:Felix SchuckertORCiD, Basel KattORCiD, Hanno LangwegORCiDGND
DOI:https://doi.org/10.1145/3098954.3103173
ISBN:978-1-4503-5257-4
Parent Title (English):Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES '17), Reggio Calabria, Italy, August 29 - September 01, 2017
Publisher:ACM
Place of publication:New York
Document Type:Conference Proceeding
Language:English
Year of Publication:2017
Release Date:2019/08/06
Page Number:7
Note:
Volltextzugriff für Angehörige der Hochschule Konstanz via ACM möglich.
Relevance:Keine peer reviewed Publikation (Wissenschaftlicher Artikel und Aufsatz, Proceeding, Artikel in Tagungsband)
Open Access?:Nein
Licence (German):License LogoUrheberrechtlich geschützt