نتایج جستجو برای: code injection

تعداد نتایج: 323507  

2010
Markus Huber Martin Mulazzani Edgar R. Weippl

Within this paper we present our novel friend injection attack which exploits the fact that the great majority of social networking sites fail to protect the communication between its users and their services. In a practical evaluation, on the basis of public wireless access points, we furthermore demonstrate the feasibility of our attack. The friend injection attack enables a stealth infiltrat...

2011
Zhijun Peng Bin Liu Weiji Wang Lipeng Lu

A multi-pulse injection strategy for premixed charge compression ignition (PCCI) combustion was investigated in a four-valve, direct-injection diesel engine by a computational fluid dynamics (CFD) simulation using KIVA-3V code coupled with detailed chemistry. The effects of fuel splitting proportion, injection timing, spray angles, and injection velocity were examined. The mixing process and fo...

2014
Xiao Zhang Wenliang Du

In this paper, we perform a thorough study on the risks imposed by the globally accessible Android Clipboard. Based on the risk assessment, we formulate a series of attacks and categorize them into two groups, i.e., manipulation and stealing. Clipboard data manipulation may lead to common code injection attacks, like JavaScript injection and command injection. Furthermore, it can also cause phi...

2016
Juhi Tandon Himani Chaudhry Riyaz Ahmad Bhat Dipti Misra Sharma

Universal Dependencies (UD) are gaining much attention of late for systematic evaluation of cross-lingual techniques for crosslingual dependency parsing. In this paper we present our work in line with UD. Our contribution to this is manifold. We extend UD to Indian languages through conversion of Pānịnian Dependencies to UD for the Hindi Dependency Treebank (HDTB). We discuss the differences in...

2012
Jens Dietrich Catherine McCartin Ewan D. Tempero Syed Muhammad Ali Shah

The refactoring of large systems is difficult, with the possibility of many refactorings having to be done before any useful benefit is attained. We present a novel approach to detect starting points for the architectural refactoring of large and complex systems based on the analysis and manipulation of the type dependency graph extracted from programs. The proposed algorithm is based on the si...

2004
Stanley R. M. Oliveira Osmar R. Zaïane Yücel Saygin

The sharing of association rules is often beneficial in industry, but requires privacy safeguards. One may decide to disclose only part of the knowledge and conceal strategic patterns which we call restrictive rules. These restrictive rules must be protected before sharing since they are paramount for strategic decisions and need to remain private. To address this challenging problem, we propos...

2007
Michalis Polychronakis Kostas G. Anagnostakis Evangelos P. Markatos

Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network-level emulation along two lines. First, we present an improved execution behavior heuristic that enables the detection of a certain class of non-self-contained polymorphic shellcodes that are currently missed by exis...

2005
Ana Nora Sovarel David Evans Nathanael Paul

Instruction Set Randomization (ISR) has been proposed as a promising defense against code injection attacks. It defuses all standard code injection attacks since the attacker does not know the instruction set of the target machine. A motivated attacker, however, may be able to circumvent ISR by determining the randomization key. In this paper, we investigate the possibility of a remote attacker...

2017
Simon Eberz Nicola Paoletti Marc Roeschlin Andrea Patané Marta Z. Kwiatkowska Ivan Martinovic

In this work we present a systematic presentation attack against ECG biometrics. We demonstrate the attack’s effectiveness using the Nymi Band, a wrist band that uses electrocardiography (ECG) as a biometric to authenticate the wearer. We instantiate the attack using a hardware-based Arbitrary Waveform Generator (AWG), an AWG software using a computer sound card, and the playback of ECG signals...

Journal: :Softw., Pract. Exper. 2010
J. Berdajs Z. Bosnic

When programmers need to modify third-party applications, they frequently do not have access to their source code. In such cases, DLL injection and API hooking are techniques that can be used to modify applications without intervening into their source code. The commonly used varieties of injection and hooking approaches have many practical limitations: they are inconvenient for a programmer to...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید