نتایج جستجو برای: code injection

تعداد نتایج: 323507  

2012
Atefeh Tajpour Suhaimi Ibrahim Mohammad Sharifi

SQL injection is a type of attack which the attacker adds Structured Query Language code to a web form input box to gain access or make changes to data. SQL injection vulnerability allows an attacker to flow commands directly to a web application's underlying database and destroy functionality or confidentiality. Researchers have proposed different tools to detect and prevent this vulnerability...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - پژوهشکده مهندسی فرایند 1395

abstract: mineral scaling in oil and gas production equipment is one of the most important problem that occurs while water injection and it has been recognized to be a major operational problem. the incompatibility between injected and formation waters may result in inorganic scale precipitation in the equipment and reservoir and then reduction of oil production rate and water injection rate. ...

2018
Qilong Han Dan Lu Kejia Zhang Xiaojiang Du Mohsen Guizani

In recent years, with the continuous development of significant data industrialization, trajectory data have more and more critical analytical value for urban construction and environmental monitoring. However, the trajectory contains a lot of personal privacy, and rashly publishing trajectory data set will cause serious privacy leakage risk. At present, the privacy protection of trajectory dat...

2010
Horst Görtz Lucas Davi Alexandra Dmitrienko Ahmad-Reza Sadeghi Marcel Winandy

In this paper we present a novel and general memory-related attack method on ARM-based computing platforms. Our attack deploys the principles of return-oriented programming (ROP), however, in contrast to conventional ROP, it exploits jumps instead of returns, and hence it can not be detected by return address checkers. Although a similar attack has been recently proposed for Intel x86, it was u...

2014
Deepali Jagtap Shirish S. Sane D. Pedreschi S. Ruggieri P. N. Tan M. Steinbach

With the advent of data mining, in many applications the automated decision making systems are used to make fair decision, but there can be discrimination hidden in the decision made by system. Discrimination refers to treating person or entity unfairly based on their membership to a certain group. Discrimination can be observed not only in social sense but also in data mining. People do not wa...

2017
Claude Carlet Sihem Mesnager Chunming Tang Yanfeng Qi

Linear complementary pairs (LCP) of codes play an important role in armoring implementations against side-channel attacks and fault injection attacks. One of the most common ways to construct LCP of codes is to use Euclidean linear complementary dual (LCD) codes. In this paper, we first introduce the concept of linear codes with σ complementary dual (σ-LCD), which includes known Euclidean LCD c...

2013
Alexander Pretschner Dominik Holling Robert Eschbach Matthias Gemmar

Because they are comparatively easy to implement, structural coverage criteria are commonly used for test derivation in modeland code-based testing. However, there is a lack of compelling evidence that they are useful for finding faults, specifically so when compared to random testing. This paper challenges the idea of using coverage criteria for test selection and instead proposes an approach ...

Journal: :CoRR 2009
Chia-Mu Yu Chun-Shien Lu Sy-Yen Kuo

Sensor networks are vulnerable to false data injection attack and path-based DoS (PDoS) attack. While conventional authentication schemes are insufficient for solving these security conflicts, an en-route filtering scheme acts as a defense against these two attacks. To construct an efficient en-route filtering scheme, this paper first presents a Constrained Function based message Authentication...

Journal: :CoRR 2017
Claudio Rizzo Lorenzo Cavallaro Johannes Kinder

A Webview embeds a full-fledged browser in a mobile application and allows the application to expose a custom interface to JavaScript code. This is a popular technique to build so-called hybrid applications, but it circumvents the usual security model of the browser: any malicious JavaScript code injected into the Webview gains access to the interface and can use it to manipulate the device or ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید