A vulnerability analysis tool is provided for identifying SQL injection threats. The tool is able to take advantage of the fact that the code for many database applications is located in modules stored within a database. The tool constructs a data flow graph based on all, or a specified subset, of the application code within the database. The tool identifies, within the data flow graph, the nodes that represent values used to construct SQL commands. Paths to those nodes are analyzed to determine whether any SQL injection threats exist.

 
Web www.patentalert.com

< Method and computer program product to increase I/O write performance in a redundant array

< Eyeglass case

> Replication and mapping mechanism for recreating memory durations

> Method and apparatus for content based authentication for network access

~ 00621