Výsledky vyhledávání - "code injection attacks"
-
1
Cyber Security Threats of Using Generative Artificial Intelligence in Source Code Management
ISSN: 2821-370X, 2821-370XVydáno: MMU Press 14.06.2025Vydáno v Journal of Informatics and Web Engineering (14.06.2025)“…Generative Artificial Intelligence (Generative AI) models are now broadly used for academic writing and software development for the sake of productivity and…”
Získat plný text
Journal Article -
2
Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art
ISSN: 0975-6809, 0976-4348Vydáno: New Delhi Springer India 01.01.2017Vydáno v International journal of system assurance engineering and management (01.01.2017)“…Nowadays, web applications are becoming one of the standard platforms for representing data and service releases over the World Wide Web. Since web…”
Získat plný text
Journal Article -
3
Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network
ISSN: 0167-739X, 1872-7115Vydáno: Elsevier B.V 01.02.2018Vydáno v Future generation computer systems (01.02.2018)“…This article presents a runtime Document Object Model (DOM) tree generator and nested context-aware sanitization based framework that alleviates the DOM-based…”
Získat plný text
Journal Article -
4
XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud
ISSN: 1380-7501, 1573-7721Vydáno: New York Springer US 01.02.2018Vydáno v Multimedia tools and applications (01.02.2018)“…This article presents a novel framework XSS-Secure, which detects and alleviates the propagation of Cross-Site Scripting (XSS) worms from the Online Social…”
Získat plný text
Journal Article -
5
CSSXC: Context-sensitive Sanitization Framework for Web Applications against XSS Vulnerabilities in Cloud Environments
ISSN: 1877-0509, 1877-0509Vydáno: Elsevier B.V 2016Vydáno v Procedia computer science (2016)“…This paper presents a context-sensitive sanitization based XSS defensive framework for the cloud environment. It discovers all the hidden injection points in…”
Získat plný text
Journal Article -
6
SEC‐H5: Secure and efficient integration of settings of enhanced HTML5 XSS vector defensive framework on edge network of fog nodes
ISSN: 1532-0626, 1532-0634Vydáno: Hoboken Wiley Subscription Services, Inc 10.09.2019Vydáno v Concurrency and computation (10.09.2019)“…Summary The authors introduce an enhanced HTML5 (H5) Cross‐Site Scripting (H5‐XSS) attack vector defensive model that safeguards and maintains the…”
Získat plný text
Journal Article -
7
Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions
ISSN: 1868-5137, 1868-5145Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.11.2019Vydáno v Journal of ambient intelligence and humanized computing (01.11.2019)“…XSS is well-thought-out to be an industry-wide problem that is affecting the diverse contemporary web platforms. The collection of most recent web application…”
Získat plný text
Journal Article -
8
Fatal injection: a survey of modern code injection attack countermeasures
ISSN: 2376-5992, 2376-5992Vydáno: San Diego PeerJ. Ltd 27.11.2017Vydáno v PeerJ. Computer science (27.11.2017)“…With a code injection attack (CIA) an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes…”
Získat plný text
Journal Article -
9
JITSafe: a framework against Just-in-time spraying attacks
ISSN: 1751-8709, 1751-8717Vydáno: Stevenage The Institution of Engineering and Technology 01.12.2013Vydáno v IET information security (01.12.2013)“…A new code-reuse attack, named Just-in-time (JIT) spraying attack, leverages the predictable generated JIT compiled code to launch an attack. It can circumvent…”
Získat plný text
Journal Article -
10
SigFree: A Signature-Free Buffer Overflow Attack Blocker
ISSN: 1545-5971, 1941-0018Vydáno: Washington IEEE 01.01.2010Vydáno v IEEE transactions on dependable and secure computing (01.01.2010)“…We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at…”
Získat plný text
Journal Article -
11
IMPRES: integrated monitoring for processor reliability and security
ISBN: 1595933816, 9781595933812ISSN: 0738-100XVydáno: New York, NY, USA ACM 24.07.2006Vydáno v 2006 43rd ACM/IEEE Design Automation Conference (24.07.2006)“…Security and reliability in processor based systems are concernsrequiring adroit solutions.Securityis often compromised by code injection attacks, jeopardizing…”
Získat plný text
Konferenční příspěvek -
12
Software Reuse Exploits in Node.js Web Apps
Vydáno: IEEE 24.11.2021Vydáno v 2021 5th International Conference on System Reliability and Safety (ICSRS) (24.11.2021)“…The npm ecosystem has the largest number of third-party packages for making node.js-based web apps. Due to its free and open nature, it can raise diversity of…”
Získat plný text
Konferenční příspěvek -
13
Protecting Code Injection Attacks in Intelligent Transportation System
ISSN: 2324-9013Vydáno: IEEE 01.08.2019Vydáno v IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.08.2019)“…TMC (traffic management system) is the vital unit of Intelligent Transport System (ITS) as it provides complex services by interacting with other smart…”
Získat plný text
Konferenční příspěvek -
14
Scan Code Injection Flaws in HTML5-Based Mobile Applications
Vydáno: IEEE 01.04.2018Vydáno v 2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW) (01.04.2018)“…HTML5-based mobile apps are becoming popular in the development of a cross-platform mobile. They are also built using web technologies, including HTML5, CSS,…”
Získat plný text
Konferenční příspěvek -
15
Implementing an ISR defense on a MIPS architecture
Vydáno: IEEE 01.09.2017Vydáno v 2017 XLIII Latin American Computer Conference (CLEI) (01.09.2017)“…Code injection attacks are an undeniable threat in today's cyberworld. Instruction Set Randomization (ISR) was initially proposed in 2003. This technique was…”
Získat plný text
Konferenční příspěvek -
16
An Approach for Constructing Indistinguishable Information Systems
Vydáno: IEEE 01.09.2018Vydáno v 2018 IEEE International Conference Quality Management, Transport and Information Security, Information Technologies (IT and QM and IS) (01.09.2018)“…Complex system contains more potential vulnerabilities. This article proposes the term "indistinguishable information system", which is a system that does not…”
Získat plný text
Konferenční příspěvek -
17
SFC: A Three Layer Smart Phone-Fag-Cloud Framework for Defending Against JavaScript Code Injection Vulnerabilities on OSN
Vydáno: IEEE 01.01.2018Vydáno v 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (01.01.2018)“…This article introduced a Fog centric model in the proximity of smart phone devices and virtual Cloud Data Centers (CDC) that senses and avoids an execution of…”
Získat plný text
Konferenční příspěvek -
18
Cross Channel Scripting (XCS) Attacks in Web Applications: Detection and Mitigation Approaches
Vydáno: IEEE 01.10.2018Vydáno v 2018 2nd Cyber Security in Networking Conference (CSNet) (01.10.2018)“…XCS (Cross Channel Scripting) is a dangerous web application vulnerability, in which injection of the malicious code and attack execution is performed through…”
Získat plný text
Konferenční příspěvek -
19
A proposed approach to detect and thwart previously unknown code injection attacks
ISBN: 9781509019496, 1509019499Vydáno: IEEE 01.12.2015Vydáno v 2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS) (01.12.2015)“…This paper presents a proposed approach called VAIL System Call Monitor (YSCM) to detect and thwart previously unknown code injection attacks. The idea is…”
Získat plný text
Konferenční příspěvek -
20
Cross-site scripting (XSS) worms in Online Social Network (OSN): Taxonomy and defensive mechanisms
Vydáno: Bharati Vidyapeeth, New Delhi as the Organizer of INDIACom - 2016 01.03.2016Vydáno v 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (01.03.2016)“…The propagation of XSS worms on the social networking sites like Twitter, LinkedIn, Facebook, etc. has observed exponential growth in modern era of Web 2.0…”
Získat plný text
Konferenční příspěvek

