{"id":"https://openalex.org/W2514783878","doi":"https://doi.org/10.1109/compsac.2016.55","title":"An Effective Penetration Test Approach Based on Feature Matrix for Exposing SQL Injection Vulnerability","display_name":"An Effective Penetration Test Approach Based on Feature Matrix for Exposing SQL Injection Vulnerability","publication_year":2016,"publication_date":"2016-06-01","ids":{"openalex":"https://openalex.org/W2514783878","doi":"https://doi.org/10.1109/compsac.2016.55","mag":"2514783878"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/compsac.2016.55","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100349568","display_name":"Lei Liu","orcid":"https://orcid.org/0000-0002-6265-9412"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lei Liu","raw_affiliation_strings":["College of Computer and Control Engineering, Nankai University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Control Engineering, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100883661","display_name":"Jing Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Xu","raw_affiliation_strings":["College of Computer and Control Engineering, Nankai University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Control Engineering, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025568264","display_name":"Hongji Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I91047523","display_name":"Bath Spa University","ror":"https://ror.org/0038jbq24","country_code":"GB","type":"education","lineage":["https://openalex.org/I91047523"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Hongji Yang","raw_affiliation_strings":["Centre for Creative Computing, Bath Spa University, Bath, England"],"affiliations":[{"raw_affiliation_string":"Centre for Creative Computing, Bath Spa University, Bath, England","institution_ids":["https://openalex.org/I91047523"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049695954","display_name":"Chenkai Guo","orcid":"https://orcid.org/0000-0003-1510-6548"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenkai Guo","raw_affiliation_strings":["College of Computer and Control Engineering, Nankai University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Control Engineering, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082794969","display_name":"Jiehui Kang","orcid":null},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiehui Kang","raw_affiliation_strings":["College of Computer and Control Engineering, Nankai University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Control Engineering, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077412882","display_name":"Sihan Xu","orcid":"https://orcid.org/0000-0002-6887-6231"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sihan Xu","raw_affiliation_strings":["College of Computer and Control Engineering, Nankai University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Control Engineering, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100752491","display_name":"Biao Zhang","orcid":"https://orcid.org/0000-0001-9205-7108"},"institutions":[{"id":"https://openalex.org/I205237279","display_name":"Nankai University","ror":"https://ror.org/01y1kjr75","country_code":"CN","type":"education","lineage":["https://openalex.org/I205237279"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Biao Zhang","raw_affiliation_strings":["College of Computer and Control Engineering, Nankai University, Tianjin, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Control Engineering, Nankai University, Tianjin, China","institution_ids":["https://openalex.org/I205237279"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003247744","display_name":"Guannan Si","orcid":"https://orcid.org/0009-0004-4152-5994"},"institutions":[{"id":"https://openalex.org/I91047523","display_name":"Bath Spa University","ror":"https://ror.org/0038jbq24","country_code":"GB","type":"education","lineage":["https://openalex.org/I91047523"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Guannan Si","raw_affiliation_strings":["Centre for Creative Computing, Bath Spa University, Bath, England"],"affiliations":[{"raw_affiliation_string":"Centre for Creative Computing, Bath Spa University, Bath, England","institution_ids":["https://openalex.org/I91047523"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.426,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":5,"citation_normalized_percentile":{"value":0.553169,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":81,"max":82},"biblio":{"volume":null,"issue":null,"first_page":"123","last_page":"132"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9745,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9738,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/sql-injection","display_name":"SQL Injection","score":0.46510348},{"id":"https://openalex.org/keywords/white-box-testing","display_name":"White-box testing","score":0.41920093}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7013874},{"id":"https://openalex.org/C150451098","wikidata":"https://www.wikidata.org/wiki/Q506059","display_name":"SQL injection","level":5,"score":0.46510348},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.44945896},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.43259025},{"id":"https://openalex.org/C162443782","wikidata":"https://www.wikidata.org/wiki/Q1066228","display_name":"White-box testing","level":5,"score":0.41920093},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35834256},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.181479},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.10426462},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.0},{"id":"https://openalex.org/C152877465","wikidata":"https://www.wikidata.org/wiki/Q208042","display_name":"Regression analysis","level":2,"score":0.0},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.0},{"id":"https://openalex.org/C194222762","wikidata":"https://www.wikidata.org/wiki/Q114486","display_name":"Query by Example","level":4,"score":0.0},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/compsac.2016.55","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.8,"id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":25,"referenced_works":["https://openalex.org/W142308502","https://openalex.org/W1648477960","https://openalex.org/W1962083226","https://openalex.org/W1976383745","https://openalex.org/W2001693166","https://openalex.org/W2003115932","https://openalex.org/W2008857097","https://openalex.org/W2065420847","https://openalex.org/W2065555413","https://openalex.org/W2066237335","https://openalex.org/W2096791889","https://openalex.org/W2101417205","https://openalex.org/W2103660000","https://openalex.org/W2110318050","https://openalex.org/W2144220405","https://openalex.org/W2147478478","https://openalex.org/W2149612134","https://openalex.org/W2150388796","https://openalex.org/W2152725427","https://openalex.org/W2166381878","https://openalex.org/W2171644977","https://openalex.org/W23242426","https://openalex.org/W2477970749","https://openalex.org/W2540205231","https://openalex.org/W3101318284"],"related_works":["https://openalex.org/W3155744979","https://openalex.org/W2945024925","https://openalex.org/W2564924167","https://openalex.org/W2532020553","https://openalex.org/W2437723255","https://openalex.org/W2350358084","https://openalex.org/W2184612063","https://openalex.org/W2140567729","https://openalex.org/W2003200839","https://openalex.org/W1991596178"],"abstract_inverted_index":{"Among":[0],"all":[1],"the":[2,14,39,57,68,101,131,139,156,162],"Web":[3,144],"application":[4],"security":[5],"issues,":[6],"SQL":[7],"Injection":[8],"Vulnerability":[9],"(SQLIV)":[10],"is":[11,23,38,53,70,86,115,118,129],"one":[12],"of":[13,24,41,67,133,141],"most":[15],"serious":[16],"problems.":[17],"How":[18],"to":[19,88,98],"test":[20,61,74,107,168],"SQLIV":[21,47,59,94,105,166],"effectively":[22,160],"great":[25],"importance.":[26],"To":[27],"address":[28],"this":[29,31],"issue,":[30],"paper":[32],"describes":[33],"a":[34,73,125],"novel":[35],"approach":[36,158],"that":[37,155],"utilization":[40],"Feature":[42],"Matrix":[43,111],"(FM)":[44],"model":[45],"for":[46,63,92,165],"black-box":[48],"penetration":[49,60,95,106,167],"test.":[50,96],"Firstly,":[51],"FM":[52,103],"introduced,":[54],"which":[55,117,134],"integrates":[56],"general":[58,93],"features":[62],"SQLIV.":[64],"Each":[65],"row":[66],"matrix":[69],"defined":[71],"as":[72],"pattern,":[75],"named":[76],"Global":[77],"Test":[78],"Pattern":[79],"(GTP).":[80],"Then,":[81],"GTP":[82],"Selection":[83,112],"(GTPS)":[84],"process":[85],"used":[87],"select":[89],"legal":[90],"GTPs":[91],"Secondly,":[97],"find":[99],"out":[100,137],"optimum":[102],"during":[104],"procedure":[108],"automatically,":[109],"Dynamic":[110],"(DMS)":[113],"algorithm":[114],"described,":[116],"based":[119],"on":[120],"dynamic":[121],"tree":[122],"pruning.":[123],"Finally,":[124],"prototype":[126],"tool":[127],"SQLEXP":[128],"developed,":[130],"experiments":[132],"are":[135],"carried":[136],"under":[138],"context":[140],"two":[142,171],"target":[143],"applications":[145],"and":[146],"about":[147],"30000":[148],"real":[149],"Internet":[150],"URLs.":[151],"The":[152],"results":[153],"show":[154],"proposed":[157],"can":[159],"improve":[161],"testing":[163,173],"effect":[164],"compared":[169],"with":[170],"benchmarking":[172],"tools.":[174]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2514783878","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2019,"cited_by_count":2}],"updated_date":"2024-12-07T08:44:07.736381","created_date":"2016-09-16"}