نتایج جستجو برای: code injection
تعداد نتایج: 323507 فیلتر نتایج به سال:
The development of yielded or failure zone due to an engineering construction is a subject of study in different disciplines. In Petroleum engineering, depletion from and injection of gas into a porous rock can cause development of a yield zone around the reservoir. Studying this phenomenon requires elasto-plastic analysis of geomaterial, in this case the porous rocks. In this study, which is a...
The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack (SQLIA). The term “SQL injection attack” is defined and a diagram (Fig.1) is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using rele...
In this paper we present a detailed review on various types of SQL injection attacks and prevention technique for web application. Here we are presenting our findings from deep survey on SQL injection attack. This paper is consist of following five section:[1] Introduction, [2]Types of Sql Injection, [3] Related work, [4] Conclusion, And [5] References. Keywords— SQL injection, database securit...
This paper defines and analyzes injection attacks. The definition is based on the NIE property, which states that an application’s untrusted inputs must only produce Noncode Insertions or Expansions in output programs (e.g., SQL queries). That is, when applications generate output programs based on untrusted inputs, the NIE property requires that inputs only affect output programs by inserting ...
We depend on database-driven web applications for an ever increasing amount of activities, such as banking and shopping. When performing such activities, we entrust our personal information to these web applications and their underlying databases. The confidentiality and integrity of this information is far from guaranteed; web applications are often vulnerable to attacks, which can give an att...
The tracking and simulation code Accsim has recently been upgraded with new treatments of transverse space charge, one based on a conventional multiple-Fourier-transform technique and another using a new hybrid-fast-multipole (HFM) method. We present the application of the code to the study of multiturn injection in the CERN PS Booster in its LHC-injector-chain operation scenario. In particular...
Command injections are prevalent to any application independently of its operating system that hosts the application or the programming language that the application itself is developed.The impact of command injection attacks ranges from loss of data confidentiality and integrity to unauthorized remote access to the system that hosts the vulnerable application. A prime example of a real, infamo...
SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application. The attack takes advantage of poor input validation in code and website administration. It allows attackers to obtain unauthorized access to the back-and database to change the intended application generated SQL queries. Researchers have proposed various solutions to address SQ...
Sql injection are one of the topmost threats for application written for the Web. In sql injection attacker gains an unauthorized access to the DB and some malicious codes are injected into it. This paper deals with web security as well as security techniques. To better counter these attack various techniques for detection and and prevention of SQL injection attack are identified in this paper ...
Software fault injection is an emerging technology that can be used to observe how software systems behave under experimentally controlled anomalous circumstances In so doing software fault injection acts as a crystal ball predicting how badly software might behave should things go awry both internally and externally during execution Such predictions provide clues as to how robust a piece of co...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید