Show simple item record  

dc.contributor.authorDelamore, Baden
dc.contributor.authorKo, Ryan K.L.
dc.coverage.spatialBeijing
dc.date.accessioned2015-05-25T00:47:45Z
dc.date.available2015-01-15
dc.date.available2015-05-25T00:47:45Z
dc.date.issued2015-01-15
dc.identifier.citationDelamore, B., & Ko, R. K. L. (2015). Escrow: A large-scale web vulnerability assessment tool. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (pp. 983–988). Washington, DC, USA: Institute of Electrical and Electronics Engineers Inc. http://doi.org/10.1109/TrustCom.2014.130en
dc.identifier.isbn9781479965137
dc.identifier.urihttps://hdl.handle.net/10289/9336
dc.description.abstractThe reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well. Amongst these vulnerabilities, SQL Injection has been classified as the most common, dangerous and prevalent web application flaw. In this paper, we propose Escrow, a large-scale SQL Injection detection tool with an exploitation module that is light-weight, fast and platform-independent. Escrow uses a custom search implementation together with a static code analysis module to find potential target web applications. Additionally, it provides a simple to use graphical user interface (GUI) to navigate through a vulnerable remote database. Escrow is implementation-agnostic, i.e. It can perform analysis on any web application regardless of the server-side implementation (PHP, ASP, etc.). Using our tool, we discovered that it is indeed possible to identify and exploit at least 100 databases per 100 minutes, without prior knowledge of their underlying implementation. We observed that for each query sent, we can scan and detect dozens of vulnerable web applications in a short space of time, while providing a means for exploitation. Finally, we provide recommendations for developers to defend against SQL injection and emphasise the need for proactive assessment and defensive coding practices.
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.rightsThis is an author’s accepted version of an article published in the journal: IEEE Microwave Magazine. ©2014 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
dc.sourceTrustCom 2014
dc.titleEscrow: A large-scale web vulnerability assessment tool
dc.typeConference Contribution
dc.identifier.doi10.1109/TrustCom.2014.130
dc.relation.isPartOf2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications
pubs.begin-page983
pubs.elements-id119347
pubs.end-page988
pubs.finish-date2014-09-26
pubs.place-of-publicationWashington, DC, USA
pubs.publisher-urlhttp://dx.doi.org/10.1109/TrustCom.2014.130
pubs.start-date2014-09-24


Files in this item

This item appears in the following Collection(s)

Show simple item record