Skip to search formSkip to main contentSkip to account menu

Code injection

Known as: Sanitization, Command injection, Injection attack 
Code injection is the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce (or… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
This paper presents an approach to the synthesis of secure real-time applications mapped on distributed embedded systems, which… 
2015
2015
. In instruction set diversification, a ”language” used in a sys-tem is uniquely diversified in order to protect software against… 
Review
2015
Review
2015
: This paper surveys the present data mining techniques used in detecting intrusions in a computer networks. The basic objective… 
2013
2013
In addition to the standard test security issues, automated scoring provides new opportunities for students to deliberately… 
2012
2012
SQL injection attacks (SQLIAs), one of the most foremost threats to Web applications is an attacking technique in which specially… 
2009
2009
This paper presents a novel backward constraint solving technique for analyzing text processing programs. String constraints are… 
2008
2008
With no one's expectation, radio frequency identification devices (RFID) tags can lead to a SQL injection attack, denial of… 
2007
2007
Anomaly Detection (AD) sensors have become an invaluable tool for forensic analysis and intrusion detection. Unfortunately, the… 
2007
2007
This work builds upon the Leurré.com infrastructure and th e Scriptgen technology. Leurré.com is a worldwide distributed setup of… 
2001
2001
A numerical study is performed in order to evaluate the performance and optimal operating conditions of suidized bed pyrolysis…