Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 電子工程學研究所
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/47278
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor李德財
dc.contributor.authorKo-Chih Wuen
dc.contributor.author巫格至zh_TW
dc.date.accessioned2021-06-15T05:53:19Z-
dc.date.available2010-08-20
dc.date.copyright2010-08-20
dc.date.issued2010
dc.date.submitted2010-08-18
dc.identifier.citation[1] ANTLR Parser Generator. http://www.antlr.org/.
[2] D. Balzarotti, M. Cova, V. Felmetsger, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Saner: Composing static and dynamic analysis to validate sanitization in web applications. In Proc. IEEE Symp. Security and Privacy SP 2008, pages 387–401, 2008.
[3] HTML Parser. http://htmlparser.sourceforge.net/.
[4] HttpClient. http://hc.apache.org/httpcomponents-client/index.html.
[5] Y.-W. Huang, S.-K. Huang, T.-P. Lin, and C.-H. Tsai. Web application se- curity assessment by fault injection and behavior monitoring. In WWW ’03: Proceedings of the 12th international conference on World Wide Web, pages 148–159, New York, NY, USA, 2003. ACM.
[6] Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo. Securing web application code by static analysis and runtime protection. In WWW ’04: Proceedings of the 13th international conference on World Wide Web, pages 40–52, New York, NY, USA, 2004. ACM.
[7] N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: a static analysis tool for detecting web application vulnerabilities. In Proc. IEEE Symp. Security and Privacy, 2006.
[8] S. Kals, E. Kirda, C. Kruegel, and N. Jovanovic. Secubat: a web vulnerability scanner. In WWW ’06: Proceedings of the 15th international conference on World Wide Web, pages 247–256, New York, NY, USA, 2006. ACM.
[9] A. Kieyzun, P. J. Guo, K. Jayaraman, and M. D. Ernst. Automatic creation of sql injection and cross-site scripting attacks. In ICSE ’09: Proceedings of the 31st International Conference on Software Engineering, pages 199–209, Wash- ington, DC, USA, 2009. IEEE Computer Society.
[10] OWASP. Top 10 2010. http://www.owasp.org/index.php/Top 10 2010, 2010.
[11] OWASP WSFuzzer Project. http://www.owasp.org/index.php/Category: OWASP WSFuzzer Project.
[12] SQLJet :: Pure Java SQLite. http://sqljet.com/.
[13] Y. Xie and A. Aiken. Static detection of security vulnerabilities in scripting languages. In 15th USENIX Security Symposium, pages 179–192, 2006.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/47278-
dc.description.abstract近年來利用自動化靜態分析工具來偵測SQL資料庫攻擊日益普遍。然而這些工具可能會產生誤報,且弱點的可信度難以檢驗。檢驗弱點的方式,就是模擬駭客或者是黑箱工具的手法,實際送出攻擊程式碼來攻擊網站並觀察攻擊是否成功。在這篇論文中,我們提出一種方法來檢驗自動化分析工具所偵測到的弱點。我們產生實際的攻擊程式碼來攻擊網站,並且監控網站運作中所執行的SQL指令,藉此判斷弱點的可信度。我們以數個真實案例來進行實驗,結果證明此方法可有效檢驗弱點。zh_TW
dc.description.abstractAutomated static analysis tools are widely used today for finding input manipulation vulnerabilities in web applications, such as SQL injection. However, these tools may produce many false positives and these reported vulnerabilities cannot be verified easily. To verify these reported vulnerabilities, concrete attack requests need to be constructed and to be submitted to the target application, just like what hackers or black-box tools will do. Our approach is to send concrete exploits and to inspect SQL queries that are executed at run-time. Thus, it is possible to declare the reported vulnerability valid (along with true exploitable SQL commands) or bogus (i.e., false positive). Our technique is proved to be effective after the evaluation against several real-world examples.en
dc.description.provenanceMade available in DSpace on 2021-06-15T05:53:19Z (GMT). No. of bitstreams: 1
ntu-99-R96943117-1.pdf: 1143287 bytes, checksum: b8e325a9c26775fcea1d395030512d0e (MD5)
Previous issue date: 2010
en
dc.description.tableofcontents1 Introduction 1
1.1 Thesis Outline 2
2 Related Work 3
2.1 Static Analysis 3
2.2 Dynamic Analysis 3
2.3 Hybrid Approach 4
3 Preliminaries 6
3.1 SQL Injection Vulnerability 6
3.2 Preventing SQL Injections 7
4 Technique 10
4.1 Components 10
4.2 Report Extraction 11
4.3 Request Collection 13
4.4 Attack Generation and Validation 14
4.5 Implementation 17
5 Experimental Results 20
5.1 Experimental Setup 20
5.2 Measurements 21
5.3 Examples 22
5.3.1 Exploitable Vulnerability 22
5.3.2 Non-Exploitable Vulnerability 27
5.4 Discussions 29
6 Conclusions and Future Work 31
6.1 Conclusions 31
6.2 FutureWork 32
Bibliography 33
dc.language.isoen
dc.subject弱點測試zh_TW
dc.subject網站應用程式安全zh_TW
dc.subjectSQL資料庫攻擊zh_TW
dc.subjectWeb application securityen
dc.subjectvulnerability testingen
dc.subjectSQL injection attacksen
dc.titleSQL資料庫攻擊程式碼之產生自動化zh_TW
dc.titleAutomated Exploit Generation for SQL Injection Attacksen
dc.typeThesis
dc.date.schoolyear98-2
dc.description.degree碩士
dc.contributor.oralexamcommittee雷欽隆,陳恭,陳昇瑋
dc.subject.keyword網站應用程式安全,SQL資料庫攻擊,弱點測試,zh_TW
dc.subject.keywordWeb application security,SQL injection attacks,vulnerability testing,en
dc.relation.page34
dc.rights.note有償授權
dc.date.accepted2010-08-18
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept電子工程學研究所zh_TW
顯示於系所單位:電子工程學研究所

文件中的檔案:
檔案 大小格式 
ntu-99-1.pdf
  未授權公開取用
1.12 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved