Search Results - "Code injection attacks"
-
1
Authors:
Source: Journal of Informatics and Web Engineering, Vol 4, Iss 2, Pp 114-124 (2025)
Subject Terms: generative ai, source code management (scm), cyber security threats, ai-generated code vulnerabilities, code injection attacks, data poisoning, Electronic computers. Computer science, QA75.5-76.95, Information technology, T58.5-58.64
File Description: electronic resource
-
2
Authors:
Source: Procedia Computer Science. 85:198-205
Subject Terms: 2. Zero hunger, JavaScript Code Injection Attacks, 0202 electrical engineering, electronic engineering, information engineering, Cross-Site Scripting (XSS) attacks, Cloud Security, 02 engineering and technology, Cloud Computing, HTML5
-
3
Authors:
Subject Terms: Ciencias Informáticas, ISR, MIPS processor, encryption circuits, code injection attacks, Hardware
File Description: application/pdf
Availability: http://sedici.unlp.edu.ar/handle/10915/65514
-
4
Authors:
Source: PeerJ Computer Science, Vol 3, p e136 (2017)
Subject Terms: Application security, Code injection attacks, Countermeasures, Static analysis, Dynamic prevention, Software vulnerabilities, Electronic computers. Computer science, QA75.5-76.95
File Description: electronic resource
-
5
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection General Terms Experimentation, Security Keywords Harvard Architecture, Embedded Devices, Wireless Sensor Networks, Code Injection Attacks, Gadgets, Return Oriented Programming, Buffer Overflow, Computer Worms
File Description: application/pdf
-
6
Authors:
Contributors:
Source: http://arxiv.org/pdf/0901.3482v1.pdf.
Subject Terms: D.4.6 [Operating Systems, Security and Protection General Terms Experimentation, Security Keywords Harvard Architecture, Embedded Devices, Wireless Sensor Networks, Code Injection Attacks, Gadgets, Return Oriented Programming, Buffer Overflow, Computer Worms
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.243.7968; http://arxiv.org/pdf/0901.3482v1.pdf
-
7
Authors:
Contributors:
Subject Terms: Software Protection, Code Injection Attacks, Security Policies
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.7753; http://www.scs.carleton.ca/~joaquin/papers/is07.pdf
-
8
Authors: et al.
Contributors: et al.
Subject Terms: Hypervisor, Code Attestation, Code Integrity, Preventing Code Injection Attacks, Memory Virtualization
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.220.5749; http://www.cs.cmu.edu/%7E15712/papers//seshadri07.pdf
-
9
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors, B.8.1 [Performance and Reliability, Reliability, Testing, and Fault-Tolerance General Terms, Design, Performance, Security Keywords, Detecting Code Injection Attacks, Basic Block Checksumming, Checksum Encryption, Bit Flips Detection
File Description: application/pdf
-
10
Authors: et al.
Subject Terms: Uncategorized, security, code injection attachs, malicious, Science & Technology, Technology, Computer Science, Theory & Methods, Engineering, Electrical & Electronic, Telecommunications, Code injection attacks, scipo, hist
Availability: http://hdl.handle.net/10536/DRO/DU:30082876
-
11
Authors:
Contributors:
Source: DTIC
Subject Terms: Computer Programming and Software, Computer Systems Management and Standards, COMPUTER PROGRAMS, COMPUTER PROGRAMMING, DATA PROCESSING SECURITY, SYMPOSIA, ISR(INSTRUCTION-SET RANDOMIZATION), CODE INJECTION ATTACKS
File Description: text/html
-
12
Authors: et al.
Contributors: et al.
Source: DTIC
Subject Terms: Computer Systems Management and Standards, DATA PROCESSING SECURITY, COMPUTER PROGRAMS, ALGORITHMS, VULNERABILITY, SYMPOSIA, CRYPTOGRAPHY, VIRTUAL EXECUTION, SOFTWARE DYNAMIC TRANSLATION, ISR(INSTRUCTION-SET RANDOMIZATION), CODE-INJECTION ATTACKS, AES(ADVANCED ENCRYPTION STANDARD), MALICIOUS CODE
File Description: text/html
-
13
-
14
Authors: et al.
Contributors: et al.
Subject Terms: Hypervisor, Code Attestation, Code Integrity, Preventing Code Injection Attacks, Memory Virtualization
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.88.3367; http://www.ece.cmu.edu/~mluk/sosp07.pdf
-
15
Authors: et al.
Contributors: et al.
Subject Terms: Engineering, General—Protection mechanisms General Terms Security, Diversity Keywords Diversity, Windows Native API, Code injection attacks
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.5580; http://mu.cs.ucdavis.edu/~fhsu/papers/asiaccs07.pdf
-
16
Authors: et al.
Contributors: et al.
Subject Terms: General Terms Security, Measurement, Design Keywords Code Injection Attacks, Multiprocessors, Tensilica, Security, Embedded System Processors
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.9874; http://www.cecs.uci.edu/~papers/esweek07/codes/p57.pdf
-
17
Authors: et al.
Contributors: et al.
Subject Terms: ware, C.0 [General, Hardware/software interfaces, System archi- tectures Keywords Instruction Set Randomization, Code Injection Attacks, Architec
File Description: application/pdf
-
18
Authors:
Contributors:
Subject Terms: Software Protection, Code Injection Attacks, Security Policies
File Description: application/pdf
-
19
Authors:
Contributors:
Subject Terms: Software Protection, Code Injection Attacks, Security Policies
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.217.3555; http://deic.uab.es/~joaquin/papers/is07.pdf
-
20
Authors:
Contributors:
Subject Terms: D.4.6 [Operating Systems, Security and Protection General Terms Experimentation, Security Keywords Harvard Architecture, Embedded Devices, Wireless Sensor Networks, Code Injection Attacks, Gadgets, Return Oriented Programming, Buffer Overflow, Computer Worms
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.5267; http://planete.inrialpes.fr/~francill/Papers/Code_Injection_Harvard_francillon_ccs08.pdf
Nájsť tento článok vo Web of Science
Full Text Finder