Volltext-Downloads (blau) und Frontdoor-Views (grau)

Source code patterns of SQL injection vulnerabilities

  • Many secure software development methods and tools are well-known and understood. Still, the same software security vulnerabilities keep occurring. To find out if new source code patterns evolved or the same patterns are reoccurring, we investigate SQL injections in PHP open source projects. SQL injections are well-known and a core part of software security education. For each common part of SQL injections, the source code patterns are analysed. Examples are pointed out showing that developers had software security in mind, but nevertheless created vulnerabilities. A comparison to earlier work shows that some categories are not found as often as expected. Our main contribution is the categorization of source code patterns.

Export metadata

Additional Services

Search Google Scholar


Author:Felix SchuckertORCiD, Basel KattORCiD, Hanno LangwegORCiDGND
Parent Title (English):Proceedings of the 12th International Conference on Availability, Reliability and Security (ARES '17), Reggio Calabria, Italy, August 29 - September 01, 2017
Place of publication:New York
Document Type:Conference Proceeding
Year of Publication:2017
Release Date:2019/08/06
Page Number:7
Volltextzugriff für Angehörige der Hochschule Konstanz via ACM möglich.
Relevance:Keine peer reviewed Publikation (Wissenschaftlicher Artikel und Aufsatz, Proceeding, Artikel in Tagungsband)
Open Access?:Nein
Licence (German):License LogoUrheberrechtlich geschützt