A4 Vertaisarvioitu artikkeli konferenssijulkaisussa

Diversifying SQL to Prevent Injection Attacks




TekijätSampsa Rauti, Jukka Teuhola, Ville Leppänen

Konferenssin vakiintunut nimiIEEE International Conference on Trust, Security and Privacy in Computing and Communications

Julkaisuvuosi2015

Kokoomateoksen nimiTrustcom/BigDataSE/ISPA, 2015 IEEE

Aloitussivu344

Lopetussivu351

Sivujen määrä8

ISBN978-1-4673-7951-9

DOIhttps://doi.org/10.1109/Trustcom.2015.393

Verkko-osoitehttp://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7345301


Tiivistelmä

This paper proposes an idea of instruction set randomization (ISR) to make SQL resistant against injection attacks. Our solution is based on a novel two-layered approach. It allows the SQL server to support several different instruction sets so that the SQL symbols used by every application are different. The internal SQL symbols used by the server are also uniquely diversified. We also tested our approach by applying it to MySQL server. We show that it prevents several injection attacks that earlier proxy-based solutions can not catch. Because our solution only quickly decodes the randomized SQL symbols in the query when it arrives to the server, it does not cause any significant performance losses contrary to a proxy-based solution. The queries in applications that use the SQL server need to be diversified accordingly, but this could be done automatically to a great extent.




Last updated on 2024-26-11 at 16:46