{"id":"https://openalex.org/W2123208719","doi":"https://doi.org/10.1109/iscc.2010.5546750","title":"Obfuscation-based analysis of SQL injection attacks","display_name":"Obfuscation-based analysis of SQL injection attacks","publication_year":2010,"publication_date":"2010-06-01","ids":{"openalex":"https://openalex.org/W2123208719","doi":"https://doi.org/10.1109/iscc.2010.5546750","mag":"2123208719"},"language":"en","primary_location":{"id":"doi:10.1109/iscc.2010.5546750","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2010.5546750","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The IEEE symposium on Computers and Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032316006","display_name":"Raju Halder","orcid":"https://orcid.org/0000-0002-8873-8258"},"institutions":[{"id":"https://openalex.org/I149461666","display_name":"Ca' Foscari University of Venice","ror":"https://ror.org/04yzxz566","country_code":"IT","type":"education","lineage":["https://openalex.org/I149461666"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Raju Halder","raw_affiliation_strings":["Dipartimento di Informatica, Universit\u00e0 Ca Foscari di Venezia, Italy","Dipartimento di Informatica, Universit\u00e0 C\u00e1 Foscari di Venezia, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Informatica, Universit\u00e0 Ca Foscari di Venezia, Italy","institution_ids":["https://openalex.org/I149461666"]},{"raw_affiliation_string":"Dipartimento di Informatica, Universit\u00e0 C\u00e1 Foscari di Venezia, Italy","institution_ids":["https://openalex.org/I149461666"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015116587","display_name":"Agostino Cortesi","orcid":"https://orcid.org/0000-0002-0946-5440"},"institutions":[{"id":"https://openalex.org/I149461666","display_name":"Ca' Foscari University of Venice","ror":"https://ror.org/04yzxz566","country_code":"IT","type":"education","lineage":["https://openalex.org/I149461666"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Agostino Cortesi","raw_affiliation_strings":["Dipartimento di Informatica, Universit\u00e0 Ca Foscari di Venezia, Italy","Dipartimento di Informatica, Universit\u00e0 C\u00e1 Foscari di Venezia, Italy"],"affiliations":[{"raw_affiliation_string":"Dipartimento di Informatica, Universit\u00e0 Ca Foscari di Venezia, Italy","institution_ids":["https://openalex.org/I149461666"]},{"raw_affiliation_string":"Dipartimento di Informatica, Universit\u00e0 C\u00e1 Foscari di Venezia, Italy","institution_ids":["https://openalex.org/I149461666"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5032316006"],"corresponding_institution_ids":["https://openalex.org/I149461666"],"apc_list":null,"apc_paid":null,"fwci":9.2928,"has_fulltext":false,"cited_by_count":30,"citation_normalized_percentile":{"value":0.97753932,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"931","last_page":"938"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/obfuscation","display_name":"Obfuscation","score":0.7879856824874878},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.771318793296814},{"id":"https://openalex.org/keywords/sql-injection","display_name":"SQL injection","score":0.7162352800369263},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3687954545021057},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1880348026752472},{"id":"https://openalex.org/keywords/query-by-example","display_name":"Query by Example","score":0.14439746737480164}],"concepts":[{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.7879856824874878},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.771318793296814},{"id":"https://openalex.org/C150451098","wikidata":"https://www.wikidata.org/wiki/Q506059","display_name":"SQL injection","level":5,"score":0.7162352800369263},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3687954545021057},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1880348026752472},{"id":"https://openalex.org/C194222762","wikidata":"https://www.wikidata.org/wiki/Q114486","display_name":"Query by Example","level":4,"score":0.14439746737480164},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.0},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/iscc.2010.5546750","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2010.5546750","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The IEEE symposium on Computers and Communications","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.377.4010","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.377.4010","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.dsi.unive.it/~cortesi/paperi/iscc10.pdf","raw_type":"text"},{"id":"pmh:oai:iris.unive.it:10278/28809","is_oa":false,"landing_page_url":"http://hdl.handle.net/10278/28809","pdf_url":null,"source":{"id":"https://openalex.org/S4306402336","display_name":"ARCA (Universit\u00e0 Ca' Foscari Venezia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149461666","host_organization_name":"Ca' Foscari University of Venice","host_organization_lineage":["https://openalex.org/I149461666"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321873","display_name":"Ministero dell\u2019Istruzione, dell\u2019Universit\u00e0 e della Ricerca","ror":"https://ror.org/0166hxq48"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W23242426","https://openalex.org/W1511560695","https://openalex.org/W1547051216","https://openalex.org/W1598083179","https://openalex.org/W1648477960","https://openalex.org/W1658853941","https://openalex.org/W1983142587","https://openalex.org/W2001693166","https://openalex.org/W2003115932","https://openalex.org/W2006591097","https://openalex.org/W2008857097","https://openalex.org/W2081048703","https://openalex.org/W2101417205","https://openalex.org/W2104129476","https://openalex.org/W2114548346","https://openalex.org/W2144696387","https://openalex.org/W2147906352","https://openalex.org/W2161688581","https://openalex.org/W3144482544","https://openalex.org/W4285719527","https://openalex.org/W6632662086","https://openalex.org/W6635665485"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4224216661","https://openalex.org/W2132360941","https://openalex.org/W3210347767","https://openalex.org/W2066014542","https://openalex.org/W67940504","https://openalex.org/W2024170198","https://openalex.org/W2898252363"],"abstract_inverted_index":{"In":[0,36],"this":[1],"paper,":[2],"we":[3],"propose":[4],"an":[5],"obfuscation/":[6],"deobfuscation":[7,101],"based":[8],"technique":[9,30],"to":[10,26,58,105,113],"detect":[11],"the":[12,37,40,43,61,69,72,75,81,86,90,107,114],"presence":[13,91],"of":[14,68,92],"possible":[15,93],"SQL":[16],"Injection":[17],"Attacks":[18],"(SQLIA)":[19],"in":[20,42,49],"a":[21,27,100],"query":[22,109],"before":[23,110],"submitting":[24,111],"it":[25,112],"DBMS.":[28,115],"This":[29],"combines":[31],"static":[32,38],"and":[33,85],"dynamic":[34,73,87],"analysis.":[35],"phase,":[39,74],"queries":[41,48],"application":[44],"are":[45,78],"replaced":[46],"by":[47],"obfuscated":[50,82],"form.":[51],"The":[52],"main":[53],"idea":[54],"behind":[55],"obfuscation":[56],"is":[57,103],"isolate":[59],"all":[60],"atomic":[62,83,96],"formulas":[63],"from":[64],"other":[65],"control":[66],"elements":[67],"query.":[70],"During":[71],"user":[76],"inputs":[77],"merged":[79],"into":[80],"formulas,":[84],"verifier":[88],"analysis":[89],"SQLIA":[94],"at":[95],"formula":[97],"level.":[98],"Finally,":[99],"step":[102],"performed":[104],"recover":[106],"original":[108]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":7},{"year":2012,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
