Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,398,463 papers from all fields of science
Search
Sign In
Create Free Account
Code injection
Known as:
Sanitization
, Command injection
, Injection attack
Expand
Code injection is the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce (or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Autodesk Maya
Beast
Binary hardening
Buffer overflow
Expand
Broader (1)
Machine code
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A PMU-based Multivariate Model for Classifying Power System Events
Rui Ma
,
S. Basumallik
,
Sara Eftekharnejad
arXiv.org
2018
Corpus ID: 54443286
Real-time transient event identification is essential for power system situational awareness and protection. The increased…
Expand
2015
2015
Diversifying SQL to Prevent Injection Attacks
Sampsa Rauti
,
J. Teuhola
,
Ville Leppänen
IEEE Trustcom/BigDataSE/ISPA
2015
Corpus ID: 967146
This paper proposes an idea of diversification to make SQL resistant against injection attacks. Our solution is based on a novel…
Expand
2015
2015
Side-channel Attack user reference architecture board SAKURA-W for security evaluation of IC card
Masato Matsubayashi
,
Akashi Satoh
Global Conference on Consumer Electronics
2015
Corpus ID: 1778860
Side-channel Attack User Reference Architecture board SAKURA-W was developed to evaluate the physical security of IC cards…
Expand
2014
2014
False information injection attack on dynamic state estimation in multi-sensor systems
Jingyang Lu
,
R. Niu
Fusion
2014
Corpus ID: 11000211
In this paper, the impact of false information injection is investigated for linear dynamic systems with multiple sensors. It is…
Expand
2011
2011
Effective SQL Injection Attack Reconstruction Using Network Recording
A. Pomeroy
,
Qing Tan
IEEE 11th International Conference on Computer…
2011
Corpus ID: 13405769
Web applications offer business and convenience services that society has become dependent on, such as online banking. Success of…
Expand
2011
2011
Constrained Function-Based Message Authentication for Sensor Networks
Chia-Mu Yu
,
Yao-Tung Tsou
,
Chun-Shien Lu
,
S. Kuo
IEEE Transactions on Information Forensics and…
2011
Corpus ID: 8566132
Sensor networks are vulnerable to false data injection attack and path-based denial of service (PDoS) attack. While conventional…
Expand
2011
2011
Cryptanalysis of Lightweight Mutual Authentication and Ownership Transfer for RFID Systems
Süleyman Kardaş
,
Mete Akgün
,
M. Kiraz
,
Hüseyin Demirci
Workshop on Lightweight Security & Privacy…
2011
Corpus ID: 16065165
Radio Frequency Identification (RFID) is a technology increasingly used in many applications for object identification. Ownership…
Expand
2009
2009
Capturing Information Flow with Concatenated Dynamic Taint Analysis
Hyung Chan Kim
,
A. Keromytis
,
M. Covington
,
R. Sahita
ARES
2009
Corpus ID: 844871
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint propagation across memory…
Expand
2007
2007
Data sanitization: improving the forensic utility of anomaly detection systems
Gabriela F. Cretu
,
A. Stavrou
,
S. Stolfo
,
A. Keromytis
2007
Corpus ID: 2004080
Anomaly Detection (AD) sensors have become an invaluable tool for forensic analysis and intrusion detection. Unfortunately, the…
Expand
2004
2004
Transactions and non-atomic API calls in Java Card: specification ambiguity and strange implementation behaviours
2004
Corpus ID: 60022154
This paper discusses an ambiguity in Sun’s specification of the Java Card platform, which we noticed in the course of developing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE