Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,121,635 papers from all fields of science
Search
Sign In
Create Free Account
Code injection
Known as:
Sanitization
, Command injection
, Injection attack
Expand
Code injection is the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce (or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Autodesk Maya
Beast
Binary hardening
Buffer overflow
Expand
Broader (1)
Machine code
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Diversifying SQL to Prevent Injection Attacks
Sampsa Rauti
,
J. Teuhola
,
Ville Leppänen
IEEE Trustcom/BigDataSE/ISPA
2015
Corpus ID: 967146
This paper proposes an idea of diversification to make SQL resistant against injection attacks. Our solution is based on a novel…
Expand
2015
2015
Side-channel Attack user reference architecture board SAKURA-W for security evaluation of IC card
Masato Matsubayashi
,
Akashi Satoh
Global Conference on Consumer Electronics
2015
Corpus ID: 1778860
Side-channel Attack User Reference Architecture board SAKURA-W was developed to evaluate the physical security of IC cards…
Expand
2015
2015
Preventing malicious attacks by diversifying Linux shell commands
J. Uitto
,
Sampsa Rauti
,
Jari-Matti Mäkelä
,
Ville Leppänen
Symposium on Programming Languages and Software…
2015
Corpus ID: 17005808
. In instruction set diversification, a ”language” used in a sys-tem is uniquely diversified in order to protect software against…
Expand
2011
2011
Dymo: Tracking Dynamic Code Identity
Bob Gilbert
,
R. Kemmerer
,
Christopher Krügel
,
Giovanni Vigna
International Symposium on Recent Advances in…
2011
Corpus ID: 5294205
Code identity is a primitive that allows an entity to recognize a known, trusted application as it executes. This primitive…
Expand
2011
2011
On predictive errors of SQL injection attack detection by the feature of the single character
T. Matsuda
,
D. Koizumi
,
M. Sonoda
,
S. Hirasawa
IEEE International Conference on Systems, Man and…
2011
Corpus ID: 30708754
The sigmoid function has been widely used in the problem of the two value distinction. In this paper, we prepare a function which…
Expand
2011
2011
Effective SQL Injection Attack Reconstruction Using Network Recording
A. Pomeroy
,
Qing Tan
IEEE 11th International Conference on Computer…
2011
Corpus ID: 13405769
Web applications offer business and convenience services that society has become dependent on, such as online banking. Success of…
Expand
2011
2011
Constrained Function-Based Message Authentication for Sensor Networks
Chia-Mu Yu
,
Yao-Tung Tsou
,
Chun-Shien Lu
,
S. Kuo
IEEE Transactions on Information Forensics and…
2011
Corpus ID: 8566132
Sensor networks are vulnerable to false data injection attack and path-based denial of service (PDoS) attack. While conventional…
Expand
2010
2010
Robust evaluation of binary collaborative recommendation under profile injection attack
Qingyun Long
,
Qiaoduo Hu
IEEE International Conference on Progress in…
2010
Corpus ID: 18703903
Recommender systems are being improved by every means to be more accurate, more robust, and faster. Collaborative filtering is…
Expand
2009
2009
Capturing Information Flow with Concatenated Dynamic Taint Analysis
Hyung Chan Kim
,
A. Keromytis
,
M. Covington
,
R. Sahita
ARES
2009
Corpus ID: 844871
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint propagation across memory…
Expand
2007
2007
Data sanitization: improving the forensic utility of anomaly detection systems
Gabriela F. Cretu
,
A. Stavrou
,
S. Stolfo
,
A. Keromytis
2007
Corpus ID: 2004080
Anomaly Detection (AD) sensors have become an invaluable tool for forensic analysis and intrusion detection. Unfortunately, the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE