Diversifying SQL to Prevent Injection Attacks




Sampsa Rauti, Jukka Teuhola, Ville Leppänen

IEEE International Conference on Trust, Security and Privacy in Computing and Communications

2015

Trustcom/BigDataSE/ISPA, 2015 IEEE

344

351

8

978-1-4673-7951-9

DOIhttps://doi.org/10.1109/Trustcom.2015.393

http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7345301



This paper proposes an idea of instruction set randomization (ISR) to make SQL resistant against injection attacks. Our solution is based on a novel two-layered approach. It allows the SQL server to support several different instruction sets so that the SQL symbols used by every application are different. The internal SQL symbols used by the server are also uniquely diversified. We also tested our approach by applying it to MySQL server. We show that it prevents several injection attacks that earlier proxy-based solutions can not catch. Because our solution only quickly decodes the randomized SQL symbols in the query when it arrives to the server, it does not cause any significant performance losses contrary to a proxy-based solution. The queries in applications that use the SQL server need to be diversified accordingly, but this could be done automatically to a great extent.




Last updated on 2024-26-11 at 16:46