Skip to search formSkip to main contentSkip to account menu

Code injection

Known as: Sanitization, Command injection, Injection attack 
Code injection is the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce (or… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
This paper proposes an idea of diversification to make SQL resistant against injection attacks. Our solution is based on a novel… 
2015
2015
Side-channel Attack User Reference Architecture board SAKURA-W was developed to evaluate the physical security of IC cards… 
2015
2015
. In instruction set diversification, a ”language” used in a sys-tem is uniquely diversified in order to protect software against… 
2011
2011
Code identity is a primitive that allows an entity to recognize a known, trusted application as it executes. This primitive… 
2011
2011
The sigmoid function has been widely used in the problem of the two value distinction. In this paper, we prepare a function which… 
2011
2011
  • A. PomeroyQing Tan
  • 2011
  • Corpus ID: 13405769
Web applications offer business and convenience services that society has become dependent on, such as online banking. Success of… 
2011
2011
Sensor networks are vulnerable to false data injection attack and path-based denial of service (PDoS) attack. While conventional… 
2010
2010
Recommender systems are being improved by every means to be more accurate, more robust, and faster. Collaborative filtering is… 
2009
2009
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint propagation across memory… 
2007
2007
Anomaly Detection (AD) sensors have become an invaluable tool for forensic analysis and intrusion detection. Unfortunately, the…