Výsledky vyhledávání - "code injection attacks"

  1. 1

    Cyber Security Threats of Using Generative Artificial Intelligence in Source Code Management Autor Nethala, Sainag, Kampa, Sandeep, Kosna, Srinivas Reddy

    ISSN: 2821-370X, 2821-370X
    Vydáno: MMU Press 14.06.2025
    “…Generative Artificial Intelligence (Generative AI) models are now broadly used for academic writing and software development for the sake of productivity and…”
    Získat plný text
    Journal Article
  2. 2

    Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art Autor Gupta, Shashank, Gupta, B. B.

    ISSN: 0975-6809, 0976-4348
    Vydáno: New Delhi Springer India 01.01.2017
    “…Nowadays, web applications are becoming one of the standard platforms for representing data and service releases over the World Wide Web. Since web…”
    Získat plný text
    Journal Article
  3. 3

    Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network Autor Gupta, Shashank, Gupta, B.B., Chaudhary, Pooja

    ISSN: 0167-739X, 1872-7115
    Vydáno: Elsevier B.V 01.02.2018
    Vydáno v Future generation computer systems (01.02.2018)
    “…This article presents a runtime Document Object Model (DOM) tree generator and nested context-aware sanitization based framework that alleviates the DOM-based…”
    Získat plný text
    Journal Article
  4. 4

    XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud Autor Gupta, Shashank, Gupta, B. B.

    ISSN: 1380-7501, 1573-7721
    Vydáno: New York Springer US 01.02.2018
    Vydáno v Multimedia tools and applications (01.02.2018)
    “…This article presents a novel framework XSS-Secure, which detects and alleviates the propagation of Cross-Site Scripting (XSS) worms from the Online Social…”
    Získat plný text
    Journal Article
  5. 5

    CSSXC: Context-sensitive Sanitization Framework for Web Applications against XSS Vulnerabilities in Cloud Environments Autor Gupta, Shashank, Gupta, B.B.

    ISSN: 1877-0509, 1877-0509
    Vydáno: Elsevier B.V 2016
    Vydáno v Procedia computer science (2016)
    “…This paper presents a context-sensitive sanitization based XSS defensive framework for the cloud environment. It discovers all the hidden injection points in…”
    Získat plný text
    Journal Article
  6. 6

    SEC‐H5: Secure and efficient integration of settings of enhanced HTML5 XSS vector defensive framework on edge network of fog nodes Autor Gupta, Shashank, Sharma, Monika, Kumar, Dhrub

    ISSN: 1532-0626, 1532-0634
    Vydáno: Hoboken Wiley Subscription Services, Inc 10.09.2019
    Vydáno v Concurrency and computation (10.09.2019)
    “…Summary The authors introduce an enhanced HTML5 (H5) Cross‐Site Scripting (H5‐XSS) attack vector defensive model that safeguards and maintains the…”
    Získat plný text
    Journal Article
  7. 7

    Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions Autor Gupta, Shashank, Gupta, B. B.

    ISSN: 1868-5137, 1868-5145
    Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.11.2019
    “…XSS is well-thought-out to be an industry-wide problem that is affecting the diverse contemporary web platforms. The collection of most recent web application…”
    Získat plný text
    Journal Article
  8. 8

    Fatal injection: a survey of modern code injection attack countermeasures Autor Mitropoulos, Dimitris, Spinellis, Diomidis

    ISSN: 2376-5992, 2376-5992
    Vydáno: San Diego PeerJ. Ltd 27.11.2017
    Vydáno v PeerJ. Computer science (27.11.2017)
    “…With a code injection attack (CIA) an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes…”
    Získat plný text
    Journal Article
  9. 9

    JITSafe: a framework against Just-in-time spraying attacks Autor Chen, Ping, Wu, Rui, Mao, Bing

    ISSN: 1751-8709, 1751-8717
    Vydáno: Stevenage The Institution of Engineering and Technology 01.12.2013
    Vydáno v IET information security (01.12.2013)
    “…A new code-reuse attack, named Just-in-time (JIT) spraying attack, leverages the predictable generated JIT compiled code to launch an attack. It can circumvent…”
    Získat plný text
    Journal Article
  10. 10

    SigFree: A Signature-Free Buffer Overflow Attack Blocker Autor Wang, Xinran, Pan, Chi-Chun, Liu, Peng, Zhu, Sencun

    ISSN: 1545-5971, 1941-0018
    Vydáno: Washington IEEE 01.01.2010
    “…We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at…”
    Získat plný text
    Journal Article
  11. 11

    IMPRES: integrated monitoring for processor reliability and security Autor Ragel, Roshan G., Parameswaran, Sri

    ISBN: 1595933816, 9781595933812
    ISSN: 0738-100X
    Vydáno: New York, NY, USA ACM 24.07.2006
    “…Security and reliability in processor based systems are concernsrequiring adroit solutions.Securityis often compromised by code injection attacks, jeopardizing…”
    Získat plný text
    Konferenční příspěvek
  12. 12

    Software Reuse Exploits in Node.js Web Apps Autor Lau, Tuong Phi

    Vydáno: IEEE 24.11.2021
    “…The npm ecosystem has the largest number of third-party packages for making node.js-based web apps. Due to its free and open nature, it can raise diversity of…”
    Získat plný text
    Konferenční příspěvek
  13. 13

    Protecting Code Injection Attacks in Intelligent Transportation System Autor Alnabulsi, Hussein, Islam, Rafiqul

    ISSN: 2324-9013
    Vydáno: IEEE 01.08.2019
    “…TMC (traffic management system) is the vital unit of Intelligent Transport System (ITS) as it provides complex services by interacting with other smart…”
    Získat plný text
    Konferenční příspěvek
  14. 14

    Scan Code Injection Flaws in HTML5-Based Mobile Applications Autor Lau, Phi Tuong

    Vydáno: IEEE 01.04.2018
    “…HTML5-based mobile apps are becoming popular in the development of a cross-platform mobile. They are also built using web technologies, including HTML5, CSS,…”
    Získat plný text
    Konferenční příspěvek
  15. 15

    Implementing an ISR defense on a MIPS architecture Autor Sancho, Loriana Sanabria, Barrantes, Elena Gabriela

    Vydáno: IEEE 01.09.2017
    “…Code injection attacks are an undeniable threat in today's cyberworld. Instruction Set Randomization (ISR) was initially proposed in 2003. This technique was…”
    Získat plný text
    Konferenční příspěvek
  16. 16

    An Approach for Constructing Indistinguishable Information Systems Autor Styugin, Mikhail A., Parotkin, Nikolay Y., Zolotarev, Vyacheslav V.

    Vydáno: IEEE 01.09.2018
    “…Complex system contains more potential vulnerabilities. This article proposes the term "indistinguishable information system", which is a system that does not…”
    Získat plný text
    Konferenční příspěvek
  17. 17

    SFC: A Three Layer Smart Phone-Fag-Cloud Framework for Defending Against JavaScript Code Injection Vulnerabilities on OSN Autor Gupta, Shashank, Gugta, B. B.

    Vydáno: IEEE 01.01.2018
    “…This article introduced a Fog centric model in the proximity of smart phone devices and virtual Cloud Data Centers (CDC) that senses and avoids an execution of…”
    Získat plný text
    Konferenční příspěvek
  18. 18

    Cross Channel Scripting (XCS) Attacks in Web Applications: Detection and Mitigation Approaches Autor Madhusudhan, R., Shashidhara

    Vydáno: IEEE 01.10.2018
    “…XCS (Cross Channel Scripting) is a dangerous web application vulnerability, in which injection of the malicious code and attack execution is performed through…”
    Získat plný text
    Konferenční příspěvek
  19. 19

    A proposed approach to detect and thwart previously unknown code injection attacks Autor Hussein, Omar, Hamza, Nermin, Hefny, Hesham

    ISBN: 9781509019496, 1509019499
    Vydáno: IEEE 01.12.2015
    “…This paper presents a proposed approach called VAIL System Call Monitor (YSCM) to detect and thwart previously unknown code injection attacks. The idea is…”
    Získat plný text
    Konferenční příspěvek
  20. 20

    Cross-site scripting (XSS) worms in Online Social Network (OSN): Taxonomy and defensive mechanisms Autor Chaudhary, Pooja, Gupta, B. B., Gupta, Shashank

    Vydáno: Bharati Vidyapeeth, New Delhi as the Organizer of INDIACom - 2016 01.03.2016
    “…The propagation of XSS worms on the social networking sites like Twitter, LinkedIn, Facebook, etc. has observed exponential growth in modern era of Web 2.0…”
    Získat plný text
    Konferenční příspěvek