Skip to search formSkip to main contentSkip to account menu

Code injection

Known as: Sanitization, Command injection, Injection attack 
Code injection is the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce (or… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Today, the large amount of information exchanged among various devices as well as the growth of the Internet of Things (IoT… 
2015
2015
This paper presents an approach to the synthesis of secure real-time applications mapped on distributed embedded systems, which… 
2015
2015
. In instruction set diversification, a ”language” used in a sys-tem is uniquely diversified in order to protect software against… 
2013
2013
The network technology has evolved significantly recently. The growing use of cloud services, increased number of users, novel… 
2013
2013
In addition to the standard test security issues, automated scoring provides new opportunities for students to deliberately… 
2012
2012
SQL injection attacks (SQLIAs), one of the most foremost threats to Web applications is an attacking technique in which specially… 
2012
2012
The SQL injection attack causes very serious problem to web applications that involve database including personal data. To detect… 
2009
2009
This paper presents a novel backward constraint solving technique for analyzing text processing programs. String constraints are… 
2008
2008
With no one's expectation, radio frequency identification devices (RFID) tags can lead to a SQL injection attack, denial of… 
2007
2007
Anomaly Detection (AD) sensors have become an invaluable tool for forensic analysis and intrusion detection. Unfortunately, the…