請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/47278完整後設資料紀錄
| DC 欄位 | 值 | 語言 |
|---|---|---|
| dc.contributor.advisor | 李德財 | |
| dc.contributor.author | Ko-Chih Wu | en |
| dc.contributor.author | 巫格至 | zh_TW |
| dc.date.accessioned | 2021-06-15T05:53:19Z | - |
| dc.date.available | 2010-08-20 | |
| dc.date.copyright | 2010-08-20 | |
| dc.date.issued | 2010 | |
| dc.date.submitted | 2010-08-18 | |
| dc.identifier.citation | [1] ANTLR Parser Generator. http://www.antlr.org/.
[2] D. Balzarotti, M. Cova, V. Felmetsger, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Saner: Composing static and dynamic analysis to validate sanitization in web applications. In Proc. IEEE Symp. Security and Privacy SP 2008, pages 387–401, 2008. [3] HTML Parser. http://htmlparser.sourceforge.net/. [4] HttpClient. http://hc.apache.org/httpcomponents-client/index.html. [5] Y.-W. Huang, S.-K. Huang, T.-P. Lin, and C.-H. Tsai. Web application se- curity assessment by fault injection and behavior monitoring. In WWW ’03: Proceedings of the 12th international conference on World Wide Web, pages 148–159, New York, NY, USA, 2003. ACM. [6] Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo. Securing web application code by static analysis and runtime protection. In WWW ’04: Proceedings of the 13th international conference on World Wide Web, pages 40–52, New York, NY, USA, 2004. ACM. [7] N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: a static analysis tool for detecting web application vulnerabilities. In Proc. IEEE Symp. Security and Privacy, 2006. [8] S. Kals, E. Kirda, C. Kruegel, and N. Jovanovic. Secubat: a web vulnerability scanner. In WWW ’06: Proceedings of the 15th international conference on World Wide Web, pages 247–256, New York, NY, USA, 2006. ACM. [9] A. Kieyzun, P. J. Guo, K. Jayaraman, and M. D. Ernst. Automatic creation of sql injection and cross-site scripting attacks. In ICSE ’09: Proceedings of the 31st International Conference on Software Engineering, pages 199–209, Wash- ington, DC, USA, 2009. IEEE Computer Society. [10] OWASP. Top 10 2010. http://www.owasp.org/index.php/Top 10 2010, 2010. [11] OWASP WSFuzzer Project. http://www.owasp.org/index.php/Category: OWASP WSFuzzer Project. [12] SQLJet :: Pure Java SQLite. http://sqljet.com/. [13] Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In 15th USENIX Security Symposium, pages 179–192, 2006. | |
| dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/47278 | - |
| dc.description.abstract | 近年來利用自動化靜態分析工具來偵測SQL資料庫攻擊日益普遍。然而這些工具可能會產生誤報,且弱點的可信度難以檢驗。檢驗弱點的方式,就是模擬駭客或者是黑箱工具的手法,實際送出攻擊程式碼來攻擊網站並觀察攻擊是否成功。在這篇論文中,我們提出一種方法來檢驗自動化分析工具所偵測到的弱點。我們產生實際的攻擊程式碼來攻擊網站,並且監控網站運作中所執行的SQL指令,藉此判斷弱點的可信度。我們以數個真實案例來進行實驗,結果證明此方法可有效檢驗弱點。 | zh_TW |
| dc.description.abstract | Automated static analysis tools are widely used today for finding input manipulation vulnerabilities in web applications, such as SQL injection. However, these tools may produce many false positives and these reported vulnerabilities cannot be verified easily. To verify these reported vulnerabilities, concrete attack requests need to be constructed and to be submitted to the target application, just like what hackers or black-box tools will do. Our approach is to send concrete exploits and to inspect SQL queries that are executed at run-time. Thus, it is possible to declare the reported vulnerability valid (along with true exploitable SQL commands) or bogus (i.e., false positive). Our technique is proved to be effective after the evaluation against several real-world examples. | en |
| dc.description.provenance | Made available in DSpace on 2021-06-15T05:53:19Z (GMT). No. of bitstreams: 1 ntu-99-R96943117-1.pdf: 1143287 bytes, checksum: b8e325a9c26775fcea1d395030512d0e (MD5) Previous issue date: 2010 | en |
| dc.description.tableofcontents | 1 Introduction 1
1.1 Thesis Outline 2 2 Related Work 3 2.1 Static Analysis 3 2.2 Dynamic Analysis 3 2.3 Hybrid Approach 4 3 Preliminaries 6 3.1 SQL Injection Vulnerability 6 3.2 Preventing SQL Injections 7 4 Technique 10 4.1 Components 10 4.2 Report Extraction 11 4.3 Request Collection 13 4.4 Attack Generation and Validation 14 4.5 Implementation 17 5 Experimental Results 20 5.1 Experimental Setup 20 5.2 Measurements 21 5.3 Examples 22 5.3.1 Exploitable Vulnerability 22 5.3.2 Non-Exploitable Vulnerability 27 5.4 Discussions 29 6 Conclusions and Future Work 31 6.1 Conclusions 31 6.2 FutureWork 32 Bibliography 33 | |
| dc.language.iso | en | |
| dc.subject | 弱點測試 | zh_TW |
| dc.subject | 網站應用程式安全 | zh_TW |
| dc.subject | SQL資料庫攻擊 | zh_TW |
| dc.subject | Web application security | en |
| dc.subject | vulnerability testing | en |
| dc.subject | SQL injection attacks | en |
| dc.title | SQL資料庫攻擊程式碼之產生自動化 | zh_TW |
| dc.title | Automated Exploit Generation for SQL Injection Attacks | en |
| dc.type | Thesis | |
| dc.date.schoolyear | 98-2 | |
| dc.description.degree | 碩士 | |
| dc.contributor.oralexamcommittee | 雷欽隆,陳恭,陳昇瑋 | |
| dc.subject.keyword | 網站應用程式安全,SQL資料庫攻擊,弱點測試, | zh_TW |
| dc.subject.keyword | Web application security,SQL injection attacks,vulnerability testing, | en |
| dc.relation.page | 34 | |
| dc.rights.note | 有償授權 | |
| dc.date.accepted | 2010-08-18 | |
| dc.contributor.author-college | 電機資訊學院 | zh_TW |
| dc.contributor.author-dept | 電子工程學研究所 | zh_TW |
| 顯示於系所單位: | 電子工程學研究所 | |
文件中的檔案:
| 檔案 | 大小 | 格式 | |
|---|---|---|---|
| ntu-99-1.pdf 未授權公開取用 | 1.12 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。
