Suchergebnisse - "Code injection attacks"

  1. 1

    Cyber Security Threats of Using Generative Artificial Intelligence in Source Code Management von Nethala, Sainag, Kampa, Sandeep, Kosna, Srinivas Reddy

    ISSN: 2821-370X, 2821-370X
    Veröffentlicht: MMU Press 14.06.2025
    Veröffentlicht in Journal of Informatics and Web Engineering (14.06.2025)
    “… Generative Artificial Intelligence (Generative AI) models are now broadly used for academic writing and software development for the sake of productivity and …”
    Volltext
    Journal Article
  2. 2

    Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art von Gupta, Shashank, Gupta, B. B.

    ISSN: 0975-6809, 0976-4348
    Veröffentlicht: New Delhi Springer India 01.01.2017
    “… Nowadays, web applications are becoming one of the standard platforms for representing data and service releases over the World Wide Web. Since web …”
    Volltext
    Journal Article
  3. 3

    Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network von Gupta, Shashank, Gupta, B.B., Chaudhary, Pooja

    ISSN: 0167-739X, 1872-7115
    Veröffentlicht: Elsevier B.V 01.02.2018
    Veröffentlicht in Future generation computer systems (01.02.2018)
    “… This article presents a runtime Document Object Model (DOM) tree generator and nested context-aware sanitization based framework that alleviates the DOM-based …”
    Volltext
    Journal Article
  4. 4

    XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud von Gupta, Shashank, Gupta, B. B.

    ISSN: 1380-7501, 1573-7721
    Veröffentlicht: New York Springer US 01.02.2018
    Veröffentlicht in Multimedia tools and applications (01.02.2018)
    “… This article presents a novel framework XSS-Secure, which detects and alleviates the propagation of Cross-Site Scripting (XSS) worms from the Online Social …”
    Volltext
    Journal Article
  5. 5

    CSSXC: Context-sensitive Sanitization Framework for Web Applications against XSS Vulnerabilities in Cloud Environments von Gupta, Shashank, Gupta, B.B.

    ISSN: 1877-0509, 1877-0509
    Veröffentlicht: Elsevier B.V 2016
    Veröffentlicht in Procedia computer science (2016)
    “… This paper presents a context-sensitive sanitization based XSS defensive framework for the cloud environment. It discovers all the hidden injection points in …”
    Volltext
    Journal Article
  6. 6

    SEC‐H5: Secure and efficient integration of settings of enhanced HTML5 XSS vector defensive framework on edge network of fog nodes von Gupta, Shashank, Sharma, Monika, Kumar, Dhrub

    ISSN: 1532-0626, 1532-0634
    Veröffentlicht: Hoboken Wiley Subscription Services, Inc 10.09.2019
    Veröffentlicht in Concurrency and computation (10.09.2019)
    “… Summary The authors introduce an enhanced HTML5 (H5) Cross‐Site Scripting (H5‐XSS) attack vector defensive model that safeguards and maintains the …”
    Volltext
    Journal Article
  7. 7

    Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions von Gupta, Shashank, Gupta, B. B.

    ISSN: 1868-5137, 1868-5145
    Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.11.2019
    “… XSS is well-thought-out to be an industry-wide problem that is affecting the diverse contemporary web platforms. The collection of most recent web application …”
    Volltext
    Journal Article
  8. 8

    Fatal injection: a survey of modern code injection attack countermeasures von Mitropoulos, Dimitris, Spinellis, Diomidis

    ISSN: 2376-5992, 2376-5992
    Veröffentlicht: San Diego PeerJ. Ltd 27.11.2017
    Veröffentlicht in PeerJ. Computer science (27.11.2017)
    “… With a code injection attack (CIA) an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes …”
    Volltext
    Journal Article
  9. 9

    JITSafe: a framework against Just-in-time spraying attacks von Chen, Ping, Wu, Rui, Mao, Bing

    ISSN: 1751-8709, 1751-8717
    Veröffentlicht: Stevenage The Institution of Engineering and Technology 01.12.2013
    Veröffentlicht in IET information security (01.12.2013)
    “… A new code-reuse attack, named Just-in-time (JIT) spraying attack, leverages the predictable generated JIT compiled code to launch an attack. It can circumvent …”
    Volltext
    Journal Article
  10. 10

    SigFree: A Signature-Free Buffer Overflow Attack Blocker von Wang, Xinran, Pan, Chi-Chun, Liu, Peng, Zhu, Sencun

    ISSN: 1545-5971, 1941-0018
    Veröffentlicht: Washington IEEE 01.01.2010
    “… We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at …”
    Volltext
    Journal Article
  11. 11

    IMPRES: integrated monitoring for processor reliability and security von Ragel, Roshan G., Parameswaran, Sri

    ISBN: 1595933816, 9781595933812
    ISSN: 0738-100X
    Veröffentlicht: New York, NY, USA ACM 24.07.2006
    Veröffentlicht in 2006 43rd ACM/IEEE Design Automation Conference (24.07.2006)
    “… Security and reliability in processor based systems are concernsrequiring adroit solutions.Securityis often compromised by code injection attacks, jeopardizing …”
    Volltext
    Tagungsbericht
  12. 12

    Software Reuse Exploits in Node.js Web Apps von Lau, Tuong Phi

    Veröffentlicht: IEEE 24.11.2021
    “… The npm ecosystem has the largest number of third-party packages for making node.js-based web apps. Due to its free and open nature, it can raise diversity of …”
    Volltext
    Tagungsbericht
  13. 13

    Protecting Code Injection Attacks in Intelligent Transportation System von Alnabulsi, Hussein, Islam, Rafiqul

    ISSN: 2324-9013
    Veröffentlicht: IEEE 01.08.2019
    “… TMC (traffic management system) is the vital unit of Intelligent Transport System (ITS) as it provides complex services by interacting with other smart …”
    Volltext
    Tagungsbericht
  14. 14

    Scan Code Injection Flaws in HTML5-Based Mobile Applications von Lau, Phi Tuong

    Veröffentlicht: IEEE 01.04.2018
    “… HTML5-based mobile apps are becoming popular in the development of a cross-platform mobile. They are also built using web technologies, including HTML5, CSS, …”
    Volltext
    Tagungsbericht
  15. 15

    Implementing an ISR defense on a MIPS architecture von Sancho, Loriana Sanabria, Barrantes, Elena Gabriela

    Veröffentlicht: IEEE 01.09.2017
    “… Code injection attacks are an undeniable threat in today's cyberworld. Instruction Set Randomization (ISR) was initially proposed in 2003. This technique was …”
    Volltext
    Tagungsbericht
  16. 16

    An Approach for Constructing Indistinguishable Information Systems von Styugin, Mikhail A., Parotkin, Nikolay Y., Zolotarev, Vyacheslav V.

    Veröffentlicht: IEEE 01.09.2018
    “… Complex system contains more potential vulnerabilities. This article proposes the term "indistinguishable information system", which is a system that does not …”
    Volltext
    Tagungsbericht
  17. 17

    SFC: A Three Layer Smart Phone-Fag-Cloud Framework for Defending Against JavaScript Code Injection Vulnerabilities on OSN von Gupta, Shashank, Gugta, B. B.

    Veröffentlicht: IEEE 01.01.2018
    “… This article introduced a Fog centric model in the proximity of smart phone devices and virtual Cloud Data Centers (CDC) that senses and avoids an execution of …”
    Volltext
    Tagungsbericht
  18. 18

    Cross Channel Scripting (XCS) Attacks in Web Applications: Detection and Mitigation Approaches von Madhusudhan, R., Shashidhara

    Veröffentlicht: IEEE 01.10.2018
    “… XCS (Cross Channel Scripting) is a dangerous web application vulnerability, in which injection of the malicious code and attack execution is performed through …”
    Volltext
    Tagungsbericht
  19. 19

    A proposed approach to detect and thwart previously unknown code injection attacks von Hussein, Omar, Hamza, Nermin, Hefny, Hesham

    ISBN: 9781509019496, 1509019499
    Veröffentlicht: IEEE 01.12.2015
    “… This paper presents a proposed approach called VAIL System Call Monitor (YSCM) to detect and thwart previously unknown code injection attacks. The idea is …”
    Volltext
    Tagungsbericht
  20. 20

    Cross-site scripting (XSS) worms in Online Social Network (OSN): Taxonomy and defensive mechanisms von Chaudhary, Pooja, Gupta, B. B., Gupta, Shashank

    Veröffentlicht: Bharati Vidyapeeth, New Delhi as the Organizer of INDIACom - 2016 01.03.2016
    “… The propagation of XSS worms on the social networking sites like Twitter, LinkedIn, Facebook, etc. has observed exponential growth in modern era of Web 2.0 …”
    Volltext
    Tagungsbericht