نتایج جستجو برای: code injection

تعداد نتایج: 323507  

2011
Pieter Philippaerts Yves Younan Stijn Muylle Frank Piessens Sven Lachmund Thomas Walter

In this paper we present an efficient countermeasure against code injection attacks. Our countermeasure does not rely on secret values such as stack canaries and protects against attacks that are not addressed by state-of-the-art countermeasures of similar performance. By enforcing the correct semantics of code pointers, we thwart attacks that modify code pointers to divert the application’s co...

2009
Michalis Polychronakis Kostas G. Anagnostakis

Remote code injection attacks against network services remain one of the most effective and widely used exploitation methods for malware propagation. In this paper, we present a study of more than 1.2 million polymorphic code injection attacks targeting production systems, captured using network-level emulation. We focus on the analysis of the structure and operation of the attack code, as well...

Mirmohammadi, Ommi,

The purpose of present paper is simulation a direct injection stratified charge natural gas engine. The KIVA-3V code was used for gaseous fuel injection simulation. Compression and expansion stroke of engine cycle is simulated using KIVA-3V code. In cylinder fuel equivalence ratio distribution criterion is used for studying mesh independency. The results show that 550000 cells number is suff...

2010
Atefeh Tajpour Maslin Masrom Mohammad JorJor Zadeh Shooshtari Hossein Rouhani Zeidanloo

SQL injection is a type of attack which the attacker adds Structured Query Language code to a web form input box to gain access or make changes to data. SQL injection vulnerability allows an attacker to flow commands directly to a web application's underlying database and destroy functionality or confidentiality. Researchers have proposed different tools to detect and prevent this vulnerability...

Journal: :JCP 2013
Dengyin Zhang Mingxiang Wan Chao Xu

The vulnerability of sensor nodes make the sensor network faces enormous security challenges. Attackers can inject false data to the network by capturing the normal nodes, by which the attackers can not only to mislead the data collection center to make the wrong decisions, but also can run out the energy of the nodes which forwarding the data. In order to cope with false data injection attack,...

2011
Zhengqin Luo Tamara Rezk Manuel Serrano

We propose a new technique based on multitier compilation for preventing code injection in web applications. It consists in adding an extra stage to the client code generator which compares the dynamically generated code with the specification obtained from the syntax of the source program. No intervention from the programmer is needed. No plugin or modification of the web browser is required. ...

2005
Dimitris Geneiatakis Georgios Kambourakis Costas Lambrinoudakis Tasos Dagiuklas Stefanos Gritzalis

− As Internet Telephony and Voice over IP (VoIP) are considered advanced Internet applications/services, they are vulnerable to attacks existing in Internet applications/services. For instance HTTP digest authentication attacks, malformed messages, message tampering with malicious code, SQL injection and more, can be launched against any Internet application/service. In this paper, we describe,...

Journal: :Inf. Manag. Comput. Security 2011
Dimitris Mitropoulos Vassilios Karakoidas Panagiotis Louridas Diomidis Spinellis

Code injection exploits a software vulnerability through which a malicious user can make an application run unauthorized code. Server applications frequently employ dynamic and domain-specific languages, which are used as vectors for the attack. We propose a generic approach that prevents the class of injection attacks involving these vectors: our scheme detects attacks by using location-specif...

2009
Elias Athanasopoulos Vasilis Pappas Evangelos P. Markatos

Code-injection attacks can take place in a large variety of layers, from native code to databases and web applications. The latter case involves mainly client-side code injection in the browser environment, also known as Cross-Site Scripting (XSS). There are numerous ways to defeat XSS attacks, from static and taint analysis to policy enforcement in the web browser. In this paper, we enlist new...

2012
V. Shanmughaneethi S. Swamynathan

Among the various types of software vulnerabilities, command injection is the most common type of threat in web applications. In command injection, SQL injection type of attacks are extremely prevalent, and ranked as the second most common form of attack on web. SQL injection attacks involve the construction of application’s input data that will result in the execution of malicious SQL statemen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید