Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,521,398 papers from all fields of science
Search
Sign In
Create Free Account
Code injection
Known as:
Sanitization
, Command injection
, Injection attack
Expand
Code injection is the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce (or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Autodesk Maya
Beast
Binary hardening
Buffer overflow
Expand
Broader (1)
Machine code
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
CODDLE: Code-Injection Detection With Deep Learning
Stanislav Abaimov
,
G. Bianchi
IEEE Access
2019
Corpus ID: 202699437
Code Injection attacks such as SQL Injection and Cross-Site Scripting (XSS) are among the major threats for today’s web…
Expand
Highly Cited
2018
Highly Cited
2018
Latent-Data Privacy Preserving With Customized Data Utility for Social Network Data
Zaobo He
,
Zhipeng Cai
,
Jiguo Yu
IEEE Transactions on Vehicular Technology
2018
Corpus ID: 6588350
Social network data can help with obtaining valuable insight into social behaviors and revealing the underlying benefits. New big…
Expand
Highly Cited
2015
Highly Cited
2015
Vulnerability Analysis and Consequences of False Data Injection Attack on Power System State Estimation
Jingwen Liang
,
L. Sankar
,
O. Kosut
IEEE Transactions on Power Systems
2015
Corpus ID: 16853048
An unobservable false data injection (FDI) attack on AC state estimation (SE) is introduced and its consequences on the physical…
Expand
Highly Cited
2015
Highly Cited
2015
A Collaborative Intrusion Detection Mechanism Against False Data Injection Attack in Advanced Metering Infrastructure
Xiaoxue Liu
,
Peidong Zhu
,
Yan Zhang
,
Kan Chen
IEEE Transactions on Smart Grid
2015
Corpus ID: 17370157
Smart meters are inherent components in advanced metering infrastructure (AMI) in the smart power grid. They are serving as the…
Expand
Highly Cited
2008
Highly Cited
2008
Code injection attacks on harvard-architecture devices
Aurélien Francillon
,
C. Castelluccia
Conference on Computer and Communications…
2008
Corpus ID: 7919593
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica…
Expand
Highly Cited
2007
Highly Cited
2007
Dare to share: Protecting sensitive knowledge with data sanitization
A. Amiri
Decision Support Systems
2007
Corpus ID: 7880815
Highly Cited
2007
Highly Cited
2007
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection
Yuji Kosuga
,
K. Kono
,
M. Hanaoka
,
Miho Hishiyama
,
Yuri Takahama
Asia-Pacific Computer Systems Architecture…
2007
Corpus ID: 14998191
With the recent rapid increase in interactive Web applications that employ back-end database services, an SQL injection attack…
Expand
Highly Cited
2005
Highly Cited
2005
Using parse tree validation to prevent SQL injection attacks
G. Buehrer
,
B. Weide
,
P. Sivilotti
Joint Conference on Lexical and Computational…
2005
Corpus ID: 5064763
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input…
Expand
Highly Cited
2004
Highly Cited
2004
Privacy-Preserving Sharing and Correlation of Security Alerts
P. Lincoln
,
Phillip A. Porras
,
Vitaly Shmatikov
USENIX Security Symposium
2004
Corpus ID: 33404358
We present a practical scheme for Internet-scale collaborative analysis of information security threats which provides strong…
Expand
Highly Cited
2003
Highly Cited
2003
Protecting sensitive knowledge by data sanitization
Stanley R. M. Oliveira
,
Osmar R Zaiane
Third IEEE International Conference on Data…
2003
Corpus ID: 18159796
We address the problem of protecting some sensitive knowledge in transactional databases. The challenge is on protecting…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE