A4 Refereed article in a conference publication

Diversifying SQL to Prevent Injection Attacks




AuthorsSampsa Rauti, Jukka Teuhola, Ville Leppänen

Conference nameIEEE International Conference on Trust, Security and Privacy in Computing and Communications

Publication year2015

Book title Trustcom/BigDataSE/ISPA, 2015 IEEE

First page 344

Last page351

Number of pages8

ISBN978-1-4673-7951-9

DOIhttps://doi.org/10.1109/Trustcom.2015.393

Web address http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7345301


Abstract

This paper proposes an idea of instruction set randomization (ISR) to make SQL resistant against injection attacks. Our solution is based on a novel two-layered approach. It allows the SQL server to support several different instruction sets so that the SQL symbols used by every application are different. The internal SQL symbols used by the server are also uniquely diversified. We also tested our approach by applying it to MySQL server. We show that it prevents several injection attacks that earlier proxy-based solutions can not catch. Because our solution only quickly decodes the randomized SQL symbols in the query when it arrives to the server, it does not cause any significant performance losses contrary to a proxy-based solution. The queries in applications that use the SQL server need to be diversified accordingly, but this could be done automatically to a great extent.




Last updated on 2024-26-11 at 16:46