Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,715,771 papers from all fields of science
Search
Sign In
Create Free Account
Code injection
Known as:
Sanitization
, Command injection
, Injection attack
Expand
Code injection is the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce (or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Autodesk Maya
Beast
Binary hardening
Buffer overflow
Expand
Broader (1)
Machine code
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Detecting Fault Injection Attacks on Embedded Real-Time Applications: A System-Level Perspective
Liang Wen
,
Wei Jiang
,
Ke Jiang
,
Xia Zhang
,
Xiong Pan
,
Keran Zhou
IEEE 17th International Conference on High…
2015
Corpus ID: 18804306
This paper presents an approach to the synthesis of secure real-time applications mapped on distributed embedded systems, which…
Expand
2015
2015
Preventing malicious attacks by diversifying Linux shell commands
J. Uitto
,
Sampsa Rauti
,
Jari-Matti Mäkelä
,
Ville Leppänen
Symposium on Programming Languages and Software…
2015
Corpus ID: 17005808
. In instruction set diversification, a ”language” used in a sys-tem is uniquely diversified in order to protect software against…
Expand
Review
2015
Review
2015
Some Studies in Intrusion Detection using Data Mining Techniques
Inadyuti Dutt
,
Dr. Samarjeet Borah
2015
Corpus ID: 212534799
: This paper surveys the present data mining techniques used in detecting intrusions in a computer networks. The basic objective…
Expand
2013
2013
Detection of gaming in automated scoring of essays with the IEA
Karen E. Lochbaum
,
Mark Rosenstein
,
P. Foltz
,
Marcia Derr
2013
Corpus ID: 16201018
In addition to the standard test security issues, automated scoring provides new opportunities for students to deliberately…
Expand
2012
2012
SQLdefend: An automated detection and prevention technique for sql injection vulnerabilities in web applications
E. Ogheneovo
,
P. O. Asagba
2012
Corpus ID: 195942937
SQL injection attacks (SQLIAs), one of the most foremost threats to Web applications is an attacking technique in which specially…
Expand
2009
2009
On Simple Linear String Equations
Xiang Fu
,
Chung-Chih Li
,
K. Qian
2009
Corpus ID: 18403372
This paper presents a novel backward constraint solving technique for analyzing text processing programs. String constraints are…
Expand
2008
2008
RFID malware fragmentation attacks
A. Sulaiman
,
M. K. Shankarapani
,
Srinivas Mukkamala
,
A. Sung
International Symposium on Collaborative…
2008
Corpus ID: 581479
With no one's expectation, radio frequency identification devices (RFID) tags can lead to a SQL injection attack, denial of…
Expand
2007
2007
Data sanitization: improving the forensic utility of anomaly detection systems
Gabriela F. Cretu
,
A. Stavrou
,
S. Stolfo
,
A. Keromytis
2007
Corpus ID: 2004080
Anomaly Detection (AD) sensors have become an invaluable tool for forensic analysis and intrusion detection. Unfortunately, the…
Expand
2007
2007
SGNET: a distributed infrastructure to handle zero-day exploits
Corrado Leita
2007
Corpus ID: 44863953
This work builds upon the Leurré.com infrastructure and th e Scriptgen technology. Leurré.com is a worldwide distributed setup of…
Expand
2001
2001
MODELING OF BIOMASS PYROLYSIS FOR HYDROGEN PRODUCTION: THE FLUIDIZED BED REACTOR
D. Lathouwers
,
J. Bellan
2001
Corpus ID: 59419436
A numerical study is performed in order to evaluate the performance and optimal operating conditions of suidized bed pyrolysis…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE