Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,095,158 papers from all fields of science
Search
Sign In
Create Free Account
Code injection
Known as:
Sanitization
, Command injection
, Injection attack
Expand
Code injection is the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce (or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Autodesk Maya
Beast
Binary hardening
Buffer overflow
Expand
Broader (1)
Machine code
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Detection of SQL injection attacks by removing the parameter values of SQL query
Rajashree A. Katole
,
S. Sherekar
,
V. Thakare
International Conference on Information Security…
2018
Corpus ID: 49536680
Internet users are increasing day by day. The web services and mobile web applications or desktop web application's demands are…
Expand
2016
2016
Design of efficient web vulnerability scanner
S. Patil
,
Nilesh R. Marathe
,
Puja Padiya
International Congress on Information and…
2016
Corpus ID: 19673335
The web applications are integral part of our day to day life. Almost everything is stored and manages on web. We use web…
Expand
2015
2015
Diversifying SQL to Prevent Injection Attacks
Sampsa Rauti
,
J. Teuhola
,
Ville Leppänen
IEEE Trustcom/BigDataSE/ISPA
2015
Corpus ID: 967146
This paper proposes an idea of diversification to make SQL resistant against injection attacks. Our solution is based on a novel…
Expand
2015
2015
Side-channel Attack user reference architecture board SAKURA-W for security evaluation of IC card
Masato Matsubayashi
,
Akashi Satoh
Global Conference on Consumer Electronics
2015
Corpus ID: 1778860
Side-channel Attack User Reference Architecture board SAKURA-W was developed to evaluate the physical security of IC cards…
Expand
2011
2011
Constrained Function-Based Message Authentication for Sensor Networks
Chia-Mu Yu
,
Yao-Tung Tsou
,
Chun-Shien Lu
,
S. Kuo
IEEE Transactions on Information Forensics and…
2011
Corpus ID: 8566132
Sensor networks are vulnerable to false data injection attack and path-based denial of service (PDoS) attack. While conventional…
Expand
2011
2011
Cryptanalysis of Lightweight Mutual Authentication and Ownership Transfer for RFID Systems
Süleyman Kardaş
,
Mete Akgün
,
M. Kiraz
,
Hüseyin Demirci
Workshop on Lightweight Security & Privacy…
2011
Corpus ID: 16065165
Radio Frequency Identification (RFID) is a technology increasingly used in many applications for object identification. Ownership…
Expand
Highly Cited
2010
Highly Cited
2010
The FFX Mode of Operation for Format-Preserving Encryption Draft 1 . 1
M. Bellare
,
P. Rogaway
,
T. Spies
2010
Corpus ID: 15488798
Schemes for FPE enable one to encrypt Social Security numbers (SSNs), credit card numbers (CCNs), and the like, doing so in such…
Expand
2010
2010
A practice-oriented framework for measuring privacy and utility in data sanitization systems
Michal Sramka
,
R. Safavi-Naini
,
J. Denzinger
,
Mina Askari
International Conference on Extending Database…
2010
Corpus ID: 14827706
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the…
Expand
2009
2009
Capturing Information Flow with Concatenated Dynamic Taint Analysis
Hyung Chan Kim
,
A. Keromytis
,
M. Covington
,
R. Sahita
ARES
2009
Corpus ID: 844871
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint propagation across memory…
Expand
2007
2007
Data sanitization: improving the forensic utility of anomaly detection systems
Gabriela F. Cretu
,
A. Stavrou
,
S. Stolfo
,
A. Keromytis
2007
Corpus ID: 2004080
Anomaly Detection (AD) sensors have become an invaluable tool for forensic analysis and intrusion detection. Unfortunately, the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE