SQL Code Poisoning: The Most Prevalent Technique for Attacking Web Powered Databases

T Tzouramanis - Database Technologies: Concepts, Methodologies …, 2009 - igi-global.com
… on the SQL code poisoning attack. It presents various ways in which a Web database can be
poisoned by malicious SQL code, … for the detection of SQL code poisoning and a number of …

Vulnerabilities in ai code generators: Exploring targeted data poisoning attacks

D Cotroneo, C Improta, P Liguori… - Proceedings of the 32nd …, 2024 - dl.acm.org
code. To address this threat, this work investigates the security of AI code generators by
devising a targeted data poisoning … by injecting increasing amounts of code containing security …

Detection model for SQL injection attack: An approach for preventing a web application from the SQL injection attack

G Buja, KB Abd Jalil, FBHM Ali… - 2014 IEEE Symposium …, 2014 - ieeexplore.ieee.org
… Cookie poisoning is an exploit that involve the cookie to get confidential information. …
the file can be the stream of source code for each web application. Next step is to launch the …

Trojansql: Sql injection against natural language interface to database

J Zhang, Y Zhou, B Hui, Y Liu, Z Li… - Proceedings of the 2023 …, 2023 - aclanthology.org
… toSQL parsers, we have developed a framework, TrojanSQL, to perform SQL injection on
NLIDBs by data poisoning. … -based SQL injection are mainly static analysis of the code (OWASP…

Trojanpuzzle: Covertly poisoning code-suggestion models

H Aghakhani, W Dai, A Manoel… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
… we only count completions that contain parameterized SQL queries with ’%s’ placeholders,
as intended by the attack, rather than other types of insecure SQL queries like format strings. …

Ssqli: A black-box adversarial attack method for sql injection based on reinforcement learning

Y Guan, J He, T Li, H Zhao, B Ma - Future Internet, 2023 - mdpi.com
… The original payload was an SQL injection code that contained the attack target and could
… of the original payload, which transformed the code into a vector containing syntactic and …

A four-way patient search method for the retrospective identification of poisoning patients

V Uslin, V Hällberg, T Lukkarinen, M Niskanen… - Scientific Reports, 2024 - nature.com
… Query Language (SQL) server … SQL server management tools from the statistical server
and converted to Microsoft Excel in CSV-format. All data collection were limited within SQL code

A Comprehensive Study on SQL Injection Attacks, Their Mode, Detection and Prevention

S Dasmohapatra, SBB Priyadarshini - Proceedings of Second Doctoral …, 2022 - Springer
… SQLI vulnerability is a kind of assaults providing SQL codes to an internet structure entering
container to achieve proper entry for adjusting data. Using this vulnerability, an attacker may …

Security vulnerabilities related to web-based data

M Awad, M Ali, M Takruri… - … Computing Electronics and …, 2019 - telkomnika.uad.ac.id
… namely: SQL injection attacks, cookie poisoning, cross-site … This attack belongs to the
code injection category and SQL … This type of attack represent to the code injection category. …

Poisoned chatgpt finds work for idle hands: Exploring developers' coding practices with insecure suggestions from poisoned ai models

S Oh, K Lee, S Park, D Kim… - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
… Thus, our research aims to analyze whether poisoning attacks on AI tools can effectively …
2 The participant receives a suggested code snippet (containing a vulnerable SQL query) …