Code injection

Results: 406



#Item
61SQL / Search algorithms / PHP programming language / Procedural programming languages / Code injection / Malware / SQL injection / PHP / Null / Computing / Software engineering / Software

Static Detection of Security Vulnerabilities in Scripting Languages Yichen Xie Alex Aiken Computer Science Department Stanford University

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2006-05-09 21:01:54
62Improving Application Security with Data Flow Assertions Alexander Yip, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek Massachusetts Institute of Technology – Computer Science and Artificial Intelligence Laboratory

Improving Application Security with Data Flow Assertions Alexander Yip, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek Massachusetts Institute of Technology – Computer Science and Artificial Intelligence Laboratory

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2009-08-18 12:06:49
63Reliability Digest, NovemberExploit Generation from Software Failures Shih-Kun Huang Information Technology Service Center National Chiao Tung University

Reliability Digest, NovemberExploit Generation from Software Failures Shih-Kun Huang Information Technology Service Center National Chiao Tung University

Add to Reading List

Source URL: rs.ieee.org

Language: English - Date: 2014-11-17 21:02:54
64Code-Injection Attacks in Browsers Supporting Policies Elias Athanasopoulos, Vasilis Pappas, and Evangelos P. Markatos FORTH-ICS

Code-Injection Attacks in Browsers Supporting Policies Elias Athanasopoulos, Vasilis Pappas, and Evangelos P. Markatos FORTH-ICS

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:05
65Web development / Scripting languages / Cross-site scripting / JavaScript / Code injection / Google Chrome / Ajax / Web server / Server-side scripting / Computing / Software / World Wide Web

Code-Injection Attacks in Browsers Supporting Policies Elias Athanasopoulos, Vasilis Pappas, and Evangelos P. Markatos Institute of Computer Science Foundation for Research and Technology - Hellas N. Plastira 100, Vassil

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:04
66Microsoft Word - f07-Just.doc

Microsoft Word - f07-Just.doc

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-11-02 14:34:57
67Securing Browser Interactions Lucas Adamski Mozilla Corporation  Defense in Depth

Securing Browser Interactions Lucas Adamski Mozilla Corporation Defense in Depth

Add to Reading List

Source URL: wiki.mozilla.org

Language: English - Date: 2010-05-08 02:04:49
68Securing PHP Applications By: Ilia Alshanetsky What is Security?  Security is a measurement, not a characteristic.

Securing PHP Applications By: Ilia Alshanetsky What is Security?  Security is a measurement, not a characteristic.

Add to Reading List

Source URL: ilia.ws

Language: English - Date: 2005-11-14 13:17:38
69Securing PHP Applications By: Ilia Alshanetsky 1  Security is a road, not a

Securing PHP Applications By: Ilia Alshanetsky 1 Security is a road, not a

Add to Reading List

Source URL: ilia.ws

Language: English - Date: 2007-05-16 10:45:52
70Securing PHP Applications By: Ilia Alshanetsky What is Security? Security is a measurement, not a characteristic. It’s is also an growing problem that requires an

Securing PHP Applications By: Ilia Alshanetsky What is Security? Security is a measurement, not a characteristic. It’s is also an growing problem that requires an

Add to Reading List

Source URL: ilia.ws

Language: English - Date: 2007-03-17 09:45:52