نتایج جستجو برای: code injection

تعداد نتایج: 323507  

Journal: :journal of mining and environment 2013
a chamani vamegh rasouli

the rapid growth in natural gas consumption has increased the need for gas storage, in particular in the form of injection into depleted reservoirs. also, co2 sequestration into the depleted reservoirs has attracted a large attention recently. however, it is important to ensure that the injection pressure is maintained below a certain limit to avoid unsealing the cap rock or reactivation of any...

2010
Elias Athanasopoulos Antonis Krithinakis Evangelos P. Markatos

Instruction Set Randomization (ISR) is a promising technique for preventing code-injection attacks. In this paper we present a complete randomization framework for JavaScript aiming at detecting and preventing Cross-Site Scripting (XSS) attacks. RaJa randomizes JavaScript source without changing the code structure. Only JavaScript identifiers are carefully modified and the randomized code can b...

2016
Felix Schuckert

This paper describes a framework, which modifies existing source code to generate security issues. An example plugin for generating SQL injection in Java source code is described. The generation process is based on static code analysis techniques like dataflow analysis and abstract syntax trees. The framework is evaluated with the help of Java projects from GitHub. One modified project was succ...

2001
Nelson G. M. Leme Eliane Martins Cecília M. F. Rubira

Problem. Among the various methods to perform Fault Injection, the technique of Software Fault Injection is getting more popular. In this technique, a special piece of code, associated to the system under test, tries to simulate faults. Generally, Fault Injection testing can be done by using a Fault Injection tool, and there is a number of them. However, there are no tools that work under each ...

2015
Javid Habibi Ajay Panicker Aditi Gupta Elisa Bertino

Security of embedded devices today is a critical requirement for the Internet of Things (IoT) as these devices will access sensitive in­ formation such as social security numbers and health records. This makes these devices a lucrative target for attacks exploiting vulnerabilities to inject malicious code or reuse existing code to alter the execution of their software. Existing defense techniqu...

Journal: :CoRR 2018
Mario Werner Thomas Unterluggauer David Schaffenrath Stefan Mangard

Embedded devices in the Internet of Things (IoT) face a wide variety of security challenges. For example, software attackers perform code injection and code-reuse attacks on their remote interfaces, and physical access to IoT devices allows to tamper with code in memory, steal confidential Intellectual Property (IP), or mount fault attacks to manipulate a CPU’s control flow. In this work, we pr...

زارعی, سارا, عباسی دوانی, فریدون, قاسمی, فرشاد, لامعی رشتی, محمد,

Side-coupled standing wave tubes in  mode are widely used in the low-energy electron linear accelerator, due to high accelerating gradient and low sensitivity to construction tolerances. The use of various simulation software for designing these kinds of tubes is very common nowadays. In this paper, SUPERFISH code and COMSOL are used for designing the accelerating and coupling cavities for a 6 ...

Journal: :CoRR 2017
Dean Sullivan Orlando Arias David Gens Lucas Davi Ahmad-Reza Sadeghi Yier Jin

Instruction set randomization (ISR) was initially proposed with the main goal of countering code-injection attacks. However, ISR seems to have lost its appeal since code-injection attacks became less attractive because protection mechanisms such as data execution prevention (DEP) as well as code-reuse attacks became more prevalent. In this paper, we show that ISR can be extended to also protect...

Introduction: Recent findings revealed the biological effects of iron oxide nanoparticles on the central nervous system. Moreover, the brain cholinergic system plays a role in the modulation of anxiety behaviors. Therefore, this study aimed to evaluate the role of dorsal hippocampal muscarinic cholinergic receptors of the CA1 area on anxiety induced by iron oxide nanoparticles in adult male rat...

2015
Tadashi Watanabe

The LSTF experiment simulating the SGTR accident at the Mihama Unit-2 reactor is analyzed using the RELAP5/MOD3.3 code. In the accident, and thus in the experiment, the ECC water was injected not only into the cold legs but into the upper plenum. Overall transients during the experiment such as pressures and fluid temperatures are simulated well by the code. The cold-leg fluid temperatures are ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید