Skip to search formSkip to main contentSkip to account menu

Code injection

Known as: Sanitization, Command injection, Injection attack 
Code injection is the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce (or… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Code Injection attacks such as SQL Injection and Cross-Site Scripting (XSS) are among the major threats for today’s web… 
Highly Cited
2018
Highly Cited
2018
Social network data can help with obtaining valuable insight into social behaviors and revealing the underlying benefits. New big… 
Highly Cited
2015
Highly Cited
2015
An unobservable false data injection (FDI) attack on AC state estimation (SE) is introduced and its consequences on the physical… 
Highly Cited
2015
Highly Cited
2015
Smart meters are inherent components in advanced metering infrastructure (AMI) in the smart power grid. They are serving as the… 
Highly Cited
2008
Highly Cited
2008
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica… 
Highly Cited
2007
Highly Cited
2007
With the recent rapid increase in interactive Web applications that employ back-end database services, an SQL injection attack… 
Highly Cited
2005
Highly Cited
2005
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input… 
Highly Cited
2004
Highly Cited
2004
We present a practical scheme for Internet-scale collaborative analysis of information security threats which provides strong… 
Highly Cited
2003
Highly Cited
2003
We address the problem of protecting some sensitive knowledge in transactional databases. The challenge is on protecting…