Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,475,652 papers from all fields of science
Search
Sign In
Create Free Account
Directory traversal attack
Known as:
Directory traversal
, Path traversal
, Path traversal vulnerability
A directory traversal (or path traversal) consists in exploiting insufficient security validation / sanitization of user-supplied input file names…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Chroot
Computer file
DOS
Double encoding
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A Simple and Intuitive Algorithm for Preventing Directory Traversal Attacks
Michael Flanders
arXiv.org
2019
Corpus ID: 199551796
With web applications becoming a preferred method of presenting graphical user interfaces to users, software vulnerabilities…
Expand
2014
2014
Research on Java Source Code Static Analysis Based on Taint Tracking
L. Han
,
T. Hou
,
K. Gao
,
Nan Liu
,
Baojiang Cui
2014
Corpus ID: 62144227
Java applications have proliferated rapidly in recent years, and the security issue in the source code seems to bring a great…
Expand
2014
2014
Blackbox security evaluation of chromecast network communications
Ali Tekeoglu
,
A. Tosun
IEEE International Performance, Computing, and…
2014
Corpus ID: 9640520
Chromecast is a small, system-on-chip device, that plugs into the HDMI port of a larger screen and turns it into a smart screen…
Expand
2009
2009
A sliding window method for finding top-k path traversal patterns over streaming Web click-sequences
Hua-Fu Li
Expert systems with applications
2009
Corpus ID: 30571797
2009
2009
Mining top-k maximal reference sequences from streaming web click-sequences with a damped sliding window
Hua-Fu Li
Expert systems with applications
2009
Corpus ID: 28867049
2006
2006
DSM-PLW: Single-pass mining of path traversal patterns over streaming Web click-sequences
Hua-Fu Li
,
Suh-Yin Lee
,
M. Shan
Comput. Networks
2006
Corpus ID: 5628658
2004
2004
Automatic Test Data Generation from Embedded C Code
E. Dillon
,
C. Meudec
International Conference on Computer Safety…
2004
Corpus ID: 7817061
A fundamental area of software engineering that remains a challenge for software developers is the delivery of software with the…
Expand
1996
1996
Efficient Data Mining for Path Traversal Patterns in Distributed Systems.
Ming-Syan Chen
,
Jong Soo Park
,
Philip S. Yu
IEEE International Conference on Distributed…
1996
Corpus ID: 25076359
1990
1990
Minimum-time trajectories for two robots holding the same workpiece
J. Bobrow
,
J. McCarthy
,
V. K. Chu
IEEE Conference on Decision and Control
1990
Corpus ID: 62073248
The authors present an algorithm which minimizes the time for two robots holding the same workpiece to move along a given path…
Expand
Highly Cited
1989
Highly Cited
1989
Navigational path planning for a vision-based mobile robot
R. Arkin
Robotica (Cambridge. Print)
1989
Corpus ID: 38900138
SUMMARY The Autonomous Robot Architecture (AuRA) provides multi-level representation and planning capabilities. This paper…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE