Skip to search formSkip to main contentSkip to account menu

Code injection

Known as: Sanitization, Command injection, Injection attack 
Code injection is the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce (or… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Internet users are increasing day by day. The web services and mobile web applications or desktop web application's demands are… 
2016
2016
The web applications are integral part of our day to day life. Almost everything is stored and manages on web. We use web… 
2015
2015
This paper proposes an idea of diversification to make SQL resistant against injection attacks. Our solution is based on a novel… 
2015
2015
Side-channel Attack User Reference Architecture board SAKURA-W was developed to evaluate the physical security of IC cards… 
2011
2011
Sensor networks are vulnerable to false data injection attack and path-based denial of service (PDoS) attack. While conventional… 
2011
2011
Radio Frequency Identification (RFID) is a technology increasingly used in many applications for object identification. Ownership… 
Highly Cited
2010
Highly Cited
2010
Schemes for FPE enable one to encrypt Social Security numbers (SSNs), credit card numbers (CCNs), and the like, doing so in such… 
2010
2010
Published data is prone to privacy attacks. Sanitization methods aim to prevent these attacks while maintaining usefulness of the… 
2009
2009
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint propagation across memory… 
2007
2007
Anomaly Detection (AD) sensors have become an invaluable tool for forensic analysis and intrusion detection. Unfortunately, the…