Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,976,515 papers from all fields of science
Search
Sign In
Create Free Account
Code injection
Known as:
Sanitization
, Command injection
, Injection attack
Expand
Code injection is the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce (or…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Autodesk Maya
Beast
Binary hardening
Buffer overflow
Expand
Broader (1)
Machine code
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Vulnerability Analysis of Trivium FPGA Implementations
F. E. Potestad-Ordóñez
,
C. Jiménez-Fernández
,
M. Valencia-Barrero
IEEE Transactions on Very Large Scale Integration…
2017
Corpus ID: 4930077
Today, the large amount of information exchanged among various devices as well as the growth of the Internet of Things (IoT…
Expand
2015
2015
Detecting Fault Injection Attacks on Embedded Real-Time Applications: A System-Level Perspective
Liang Wen
,
Wei Jiang
,
Ke Jiang
,
Xia Zhang
,
Xiong Pan
,
Keran Zhou
IEEE 17th International Conference on High…
2015
Corpus ID: 18804306
This paper presents an approach to the synthesis of secure real-time applications mapped on distributed embedded systems, which…
Expand
2015
2015
Preventing malicious attacks by diversifying Linux shell commands
J. Uitto
,
Sampsa Rauti
,
Jari-Matti Mäkelä
,
Ville Leppänen
Symposium on Programming Languages and Software…
2015
Corpus ID: 17005808
. In instruction set diversification, a ”language” used in a sys-tem is uniquely diversified in order to protect software against…
Expand
2013
2013
Evaluation of Various Techniques for SQL Injection Attack Detection
M. Choraś
,
R. Kozik
International Conference on Computer Recognition…
2013
Corpus ID: 19705769
The network technology has evolved significantly recently. The growing use of cloud services, increased number of users, novel…
Expand
2013
2013
Detection of gaming in automated scoring of essays with the IEA
Karen E. Lochbaum
,
Mark Rosenstein
,
P. Foltz
,
Marcia Derr
2013
Corpus ID: 16201018
In addition to the standard test security issues, automated scoring provides new opportunities for students to deliberately…
Expand
2012
2012
SQLdefend: An automated detection and prevention technique for sql injection vulnerabilities in web applications
E. Ogheneovo
,
P. O. Asagba
2012
Corpus ID: 195942937
SQL injection attacks (SQLIAs), one of the most foremost threats to Web applications is an attacking technique in which specially…
Expand
2012
2012
A Learning Algorithm of Threshold Value on the Automatic Detection of SQL Injection Attack
Koizumi Daiki
,
Matsuda Takeshi
,
Sonoda Michio
,
Hirasawa Shigeichi
2012
Corpus ID: 54925520
The SQL injection attack causes very serious problem to web applications that involve database including personal data. To detect…
Expand
2009
2009
On Simple Linear String Equations
Xiang Fu
,
Chung-Chih Li
,
K. Qian
2009
Corpus ID: 18403372
This paper presents a novel backward constraint solving technique for analyzing text processing programs. String constraints are…
Expand
2008
2008
RFID malware fragmentation attacks
A. Sulaiman
,
M. K. Shankarapani
,
Srinivas Mukkamala
,
A. Sung
International Symposium on Collaborative…
2008
Corpus ID: 581479
With no one's expectation, radio frequency identification devices (RFID) tags can lead to a SQL injection attack, denial of…
Expand
2007
2007
Data sanitization: improving the forensic utility of anomaly detection systems
Gabriela F. Cretu
,
A. Stavrou
,
S. Stolfo
,
A. Keromytis
2007
Corpus ID: 2004080
Anomaly Detection (AD) sensors have become an invaluable tool for forensic analysis and intrusion detection. Unfortunately, the…
Expand