Skip to search formSkip to main contentSkip to account menu

Code injection

Known as: Sanitization, Command injection, Injection attack 
Code injection is the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce (or… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
As opposed to a traditional power grid, a smart grid can help utilities to save energy and therefore reduce the cost of operation… 
2015
2015
This paper proposes an idea of diversification to make SQL resistant against injection attacks. Our solution is based on a novel… 
2015
2015
Side-channel Attack User Reference Architecture board SAKURA-W was developed to evaluate the physical security of IC cards… 
2013
2013
ADSL routers are an integral part of today's home and small office networks. Typically, these devices are provided by a user's… 
2011
2011
  • A. PomeroyQing Tan
  • 2011
  • Corpus ID: 13405769
Web applications offer business and convenience services that society has become dependent on, such as online banking. Success of… 
2011
2011
Radio Frequency Identification (RFID) is a technology increasingly used in many applications for object identification. Ownership… 
2011
2011
Sensor networks are vulnerable to false data injection attack and path-based denial of service (PDoS) attack. While conventional… 
2009
2009
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint propagation across memory… 
2007
2007
Anomaly Detection (AD) sensors have become an invaluable tool for forensic analysis and intrusion detection. Unfortunately, the… 
2004
2004
  • 2004
  • Corpus ID: 60022154
This paper discusses an ambiguity in Sun’s specification of the Java Card platform, which we noticed in the course of developing…