Code injection

Known as: Sanitization, Command injection, Injection attack 
Code injection is the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce (or… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
With rapid advances in sensor, computer, and communication networks, modern power systems have become complicated cyber-physical… (More)
  • figure 1
  • table I
  • figure 2
Is this relevant?
2012
2012
This paper shows that existing definitions of code-injection attacks (e.g., SQL-injection attacks) are flawed. The flaws make it… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Heap spraying is a security attack that increases the exploitability of memory corruption errors in type-unsafe applications. In… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory… (More)
  • figure 1
  • figure 2
  • table 1
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We propose SecVisor, a tiny hypervisor that ensures code integrity for commodity OS kernels. In particular, SecVisor ensures that… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We describe a new, general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoff's… (More)
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Software vulnerabilities that enable the injection and executi on of malicious code in pervasive Internet-connected computing… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • table 3
Is this relevant?