XML-based authentication to handle SQL injection

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Structured Query Language (SQL) injection is one of themost devastating vulnerabilities to impact a business, as it can lead to the exposure of sensitive information stored in an application’s database. SQL injection can compromise usernames, passwords, addresses, phone numbers, and credit card details. It is the vulnerability that results when an attacker achieves the ability to influence SQL queries that an application passes to a back-end database. The attacker can often leverage the syntax and capabilities of SQL, as well as the power and flexibility of supporting database functionality and operating system functionality available to the database to compromise the web application. In this article we demonstrate two non-web-based SQL injection attacks one of which can be carried out by executing a stored procedure with escalating privileges. We present XML-based authentication approach which can handle this problem in some way.

Cite

CITATION STYLE

APA

Mishra, N., Chaturvedi, S., Sharma, A. K., & Choudhary, S. (2014). XML-based authentication to handle SQL injection. In Advances in Intelligent Systems and Computing (Vol. 236, pp. 739–749). Springer Verlag. https://doi.org/10.1007/978-81-322-1602-5_79

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free