Isaa Rev-1
Isaa Rev-1
Detecting SQL Injection William G.J. Halfond and This paper presents a
Attacks Using Dynamic Alessandro Orso (2006) dynamic analysis
Analysis technique for detecting
SQL injection attacks in
web applications. The
authors propose a tool
called SQLCheck that
analyzes the execution
of web applications and
identifies SQL injection
vulnerabilities by
checking the syntax of
SQL queries executed by
the application.
Detecting SQL Injection William G.J. Halfond and This paper proposes a
Attacks Using Dynamic Alessandro Orso (2006) method for detecting
Analysis SQL injection attacks in
web applications using
dynamic analysis. The
method involves
instrumenting the web
application with a tool
that monitors the
application's behavior
at runtime and
identifies SQL injection
attacks by analyzing the
application's input and
output. The authors
evaluate the
effectiveness of the
method through
experiments and
demonstrate its ability
to detect SQL injection
attacks with high
accuracy.
Scanning of Real-world Adonis P.H. Fung†, Tielei The paper addresses the
Web Applications for Wang‡, K.W. Cheung†, need to secure web
Parameter Tampering and T.Y. Wong† applications that rely on
Vulnerabilities parameter exchanges
between clients and
servers, especially those
involving complex
workflows and
dependencies. Such
applications are
susceptible to
parameter tampering
attacks when lacking
proper server-side input
validation. Existing
fuzzing-based scanning
methods have
overlooked these critical
controls, leading to their
requests being dropped
before reaching
vulnerable code
Cross-Site Scripting Shashank Gupta1 • B. B. The paper focuses on
(XSS) attacks and Gupta1 the prevalence of web-
defense mechanisms: related vulnerabilities,
classification and state- particularly in security-
of-the-art critical web
applications. It
highlights the
persistence of
vulnerabilities across
various sectors, such as
banking, healthcare,
finance, and retail. The
most prominent
vulnerability is Cross-
Site Scripting (XSS)
attack, which poses a
significant threat to
modern web
applications.
Session Hijacking and Anuj Kumar Baitha*, The paper explores
Prevention Technique Prof. Smitha Vinod session hijacking
attacks, where
unauthorized access is
gained to valid session
connections, often
targeting social
networking and banking
websites. Session
hijacking, also known as
Man in the Middle
(MIMA) attack, poses a
significant cybersecurity
threat. The paper
highlights a specific
attack, SSL Strip attack,
which is crucial in this
context.