Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,373,849 papers from all fields of science
Search
Sign In
Create Free Account
Code injection
Known as:
Sanitization
, Command injection
, Injection attack
Expand
Code injection is the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce (or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Autodesk Maya
Beast
Binary hardening
Buffer overflow
Expand
Broader (1)
Machine code
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Attacks due to False Data Injection in Smart Grids: Detection & Protection
Maryam Iqbal
,
M. Iqbal
Global Power, Energy and Communication Conference
2019
Corpus ID: 199059463
As opposed to a traditional power grid, a smart grid can help utilities to save energy and therefore reduce the cost of operation…
Expand
2015
2015
Diversifying SQL to Prevent Injection Attacks
Sampsa Rauti
,
J. Teuhola
,
Ville Leppänen
IEEE Trustcom/BigDataSE/ISPA
2015
Corpus ID: 967146
This paper proposes an idea of diversification to make SQL resistant against injection attacks. Our solution is based on a novel…
Expand
2015
2015
Side-channel Attack user reference architecture board SAKURA-W for security evaluation of IC card
Masato Matsubayashi
,
Akashi Satoh
Global Conference on Consumer Electronics
2015
Corpus ID: 1778860
Side-channel Attack User Reference Architecture board SAKURA-W was developed to evaluate the physical security of IC cards…
Expand
2013
2013
The weakest link on the network: Exploiting ADSL routers to perform cyber-attacks
Anastasios Stasinopoulos
,
Christoforos Ntantogian
,
C. Xenakis
IEEE International Symposium on Signal Processing…
2013
Corpus ID: 16068991
ADSL routers are an integral part of today's home and small office networks. Typically, these devices are provided by a user's…
Expand
2011
2011
Effective SQL Injection Attack Reconstruction Using Network Recording
A. Pomeroy
,
Qing Tan
IEEE 11th International Conference on Computer…
2011
Corpus ID: 13405769
Web applications offer business and convenience services that society has become dependent on, such as online banking. Success of…
Expand
2011
2011
Cryptanalysis of Lightweight Mutual Authentication and Ownership Transfer for RFID Systems
Süleyman Kardaş
,
Mete Akgün
,
M. Kiraz
,
Hüseyin Demirci
Workshop on Lightweight Security & Privacy…
2011
Corpus ID: 16065165
Radio Frequency Identification (RFID) is a technology increasingly used in many applications for object identification. Ownership…
Expand
2011
2011
Constrained Function-Based Message Authentication for Sensor Networks
Chia-Mu Yu
,
Yao-Tung Tsou
,
Chun-Shien Lu
,
S. Kuo
IEEE Transactions on Information Forensics and…
2011
Corpus ID: 8566132
Sensor networks are vulnerable to false data injection attack and path-based denial of service (PDoS) attack. While conventional…
Expand
2009
2009
Capturing Information Flow with Concatenated Dynamic Taint Analysis
Hyung Chan Kim
,
A. Keromytis
,
M. Covington
,
R. Sahita
ARES
2009
Corpus ID: 844871
Dynamic taint analysis (DTA) is a technique used for tracking information flow by propagating taint propagation across memory…
Expand
2007
2007
Data sanitization: improving the forensic utility of anomaly detection systems
Gabriela F. Cretu
,
A. Stavrou
,
S. Stolfo
,
A. Keromytis
2007
Corpus ID: 2004080
Anomaly Detection (AD) sensors have become an invaluable tool for forensic analysis and intrusion detection. Unfortunately, the…
Expand
2004
2004
Transactions and non-atomic API calls in Java Card: specification ambiguity and strange implementation behaviours
2004
Corpus ID: 60022154
This paper discusses an ambiguity in Sun’s specification of the Java Card platform, which we noticed in the course of developing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE