Code injection

Results: 406



#Item
1

An Empirical Study of Real-world Polymorphic Code Injection Attacks Michalis Polychronakis∗ Kostas G. Anagnostakis† Abstract

Add to Reading List

Source URL: www.ics.forth.gr

- Date: 2012-03-22 09:28:00
    2

    Randomized Instruction Set Emulation ∗ to Disrupt Binary Code Injection Attacks Elena Gabriela Barrantes David H. Ackley

    Add to Reading List

    Source URL: agl.cs.unm.edu

    - Date: 2013-02-21 14:56:46
      3Computing / Computer security / Cyberwarfare / Computer network security / Cross-site scripting / OWASP / SQL injection / Web application security / Code injection / JavaScript / Character encodings in HTML / HTTP header injection

            OWASP Top 10 Proactive Controls 2016 

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2016-01-25 17:05:07
      4Computing / Cyberwarfare / Computer security / Computer network security / SQL / Hacking / Software testing / Web applications / SQL injection / Vulnerability / Web application security / Code injection

      Achieving Web Security by Increasing the Web Application Safety Maryam Abedi Navid Nikmehr Mohsen Doroodchi

      Add to Reading List

      Source URL: worldcomp-proceedings.com

      Language: English - Date: 2014-05-28 12:08:56
      5Computer security / Cyberwarfare / Computing / Computer network security / Software testing / Vulnerability / Hacking / Zero-day / Buffer overflow / Metasploit Project / Code injection / Social vulnerability

      224 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5,

      Add to Reading List

      Source URL: users.ece.cmu.edu

      Language: English - Date: 2014-05-29 15:38:01
      6Computer security / Cyberwarfare / Cybercrime / Hacking / Cross-site scripting / Hypertext Transfer Protocol / SQL injection / Code injection / Cross-site request forgery / Vulnerability / Full disclosure / HTTP cookie

      VoidSec Advisory 2016

      Add to Reading List

      Source URL: www.exploit-db.com

      Language: English - Date: 2016-04-13 11:30:11
      7Software engineering / Stationery / Software architecture / Software design patterns / Enterprise application integration / Loose coupling / Coupling / Letter / Dependency injection / Paper size / Railway coupling / Pe

      Dependency Injection in ZF2 Rob Allen ~ October 2014 Dependency Injection enables loose coupling and loose coupling makes code more maintainable

      Add to Reading List

      Source URL: akrabat.com

      Language: English - Date: 2014-10-28 14:24:53
      8Hacking / Software testing / BitLocker / Disk encryption / Windows Server / Windows Vista / Code injection / Cross-site scripting / SQL injection / Buffer overflow / Transmission Control Protocol / Vulnerability

      Department of Electrical Engineering and Computer Science MASSACHUSETTS INSTITUTE OF TECHNOLOGYFallQuiz II

      Add to Reading List

      Source URL: css.csail.mit.edu

      Language: English - Date: 2016-01-29 11:50:05
      9Query languages / Functional languages / Web programming / SQL / Domain-specific language / Cross-site scripting / Language Integrated Query / Code injection / JavaScript / SQL injection / Embedded SQL

      Advances in Programming Languages APL17: Using SQL from Java Ian Stark School of Informatics The University of Edinburgh

      Add to Reading List

      Source URL: www.inf.ed.ac.uk

      Language: English - Date: 2010-03-07 23:15:38
      10Software testing / Address space layout randomization / Computer network security / Binary hardening / Code injection / SQL injection / Heap / Vulnerability / GrammaTech / Computer security

      REPORT DOCUMENTATION PAGE

      Add to Reading List

      Source URL: samate.nist.gov

      Language: English - Date: 2015-10-27 14:35:32
      UPDATE