Code injection

Results: 406



#Item
81FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications Prateek Saxena§ Steve Hanna§ Pongsin Poosankam‡§ Dawn Song§

FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications Prateek Saxena§ Steve Hanna§ Pongsin Poosankam‡§ Dawn Song§

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
82The Eval that Men Do A Large-scale Study of the Use of Eval in JavaScript Applications Gregor Richards Christian Hammer

The Eval that Men Do A Large-scale Study of the Use of Eval in JavaScript Applications Gregor Richards Christian Hammer

Add to Reading List

Source URL: the.gregor.institute

Language: English - Date: 2014-09-17 17:38:08
83Static Detection of Application Backdoors Chris Wysopal, Chris Eng Veracode, Inc. Burlington, MA USA [removed], [removed] Abstract— This paper describes a high level classification of

Static Detection of Application Backdoors Chris Wysopal, Chris Eng Veracode, Inc. Burlington, MA USA [removed], [removed] Abstract— This paper describes a high level classification of

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2014-02-11 00:25:06
84Damn Vulnerable Web App Ryan Dewhurst, Aralık 2009, WGT E-Dergi 3. Sayı I wanted an application developed in PHP/MySQL that was vulnerable to the most common types of web application vulnerabilities, that I could pract

Damn Vulnerable Web App Ryan Dewhurst, Aralık 2009, WGT E-Dergi 3. Sayı I wanted an application developed in PHP/MySQL that was vulnerable to the most common types of web application vulnerabilities, that I could pract

Add to Reading List

Source URL: webguvenligi.org

Language: English - Date: 2011-08-03 19:42:25
85Journal of Computer Security[removed]–907 DOI[removed]JCS[removed]IOS Press 861

Journal of Computer Security[removed]–907 DOI[removed]JCS[removed]IOS Press 861

Add to Reading List

Source URL: iseclab.org

Language: English - Date: 2010-09-29 15:20:37
86Code Injection Attacks on HTML5-based Mobile Apps Xing Jin, Tongbo Luo, Derek G. Tsui, Wenliang Du Dept. of Electrical Engineering & Computer Science, Syracuse University, Syracuse, NY  using different languages. If othe

Code Injection Attacks on HTML5-based Mobile Apps Xing Jin, Tongbo Luo, Derek G. Tsui, Wenliang Du Dept. of Electrical Engineering & Computer Science, Syracuse University, Syracuse, NY using different languages. If othe

Add to Reading List

Source URL: mostconf.org

Language: English - Date: 2014-05-17 09:18:13
87An Evaluation of the Google Chrome Extension Security Architecture Nicholas Carlini, Adrienne Porter Felt, and David Wagner University of California, Berkeley [removed], [removed], [removed]

An Evaluation of the Google Chrome Extension Security Architecture Nicholas Carlini, Adrienne Porter Felt, and David Wagner University of California, Berkeley [removed], [removed], [removed]

Add to Reading List

Source URL: nicholas.carlini.com

Language: English - Date: 2013-10-16 18:28:56
88Securing Web Applications with Static and Dynamic Information Flow Tracking Monica S. Lam Michael Martin

Securing Web Applications with Static and Dynamic Information Flow Tracking Monica S. Lam Michael Martin

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2007-12-15 19:41:29
89Delft University of Technology Software Engineering Research Group Technical Report Series Preventing Injection Attacks with Syntax Embeddings

Delft University of Technology Software Engineering Research Group Technical Report Series Preventing Injection Attacks with Syntax Embeddings

Add to Reading List

Source URL: swerl.tudelft.nl

Language: English - Date: 2007-02-05 11:40:47
90An Empirical Study on the Effectiveness of Security Code Review Anne Edmundson1 , Brian Holtkamp2 , Emanuel Rivera3 , Matthew Finifter4 , Adrian Mettler4 , and David Wagner4 1 Cornell University, Ithaca, NY, USA

An Empirical Study on the Effectiveness of Security Code Review Anne Edmundson1 , Brian Holtkamp2 , Emanuel Rivera3 , Matthew Finifter4 , Adrian Mettler4 , and David Wagner4 1 Cornell University, Ithaca, NY, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40