نتایج جستجو برای: code injection

تعداد نتایج: 323507  

The development of yielded or failure zone due to an engineering construction is a subject of study in different disciplines. In Petroleum engineering, depletion from and injection of gas into a porous rock can cause development of a yield zone around the reservoir. Studying this phenomenon requires elasto-plastic analysis of geomaterial, in this case the porous rocks. In this study, which is a...

2012
Bojken Shehu Aleksander Xhuvani Shqiponja Ahmetaj

The paper begins by identifying the organizations which are vulnerable to the SQL attack referred to as an SQL injection attack (SQLIA). The term “SQL injection attack” is defined and a diagram (Fig.1) is used to illustrate the way that attack occurs. In another section, the paper identifies the methods used to detect an attack to SQL, whereby the techniques are discussed extensively using rele...

2012
Shubham Srivastava

In this paper we present a detailed review on various types of SQL injection attacks and prevention technique for web application. Here we are presenting our findings from deep survey on SQL injection attack. This paper is consist of following five section:[1] Introduction, [2]Types of Sql Injection, [3] Related work, [4] Conclusion, And [5] References. Keywords— SQL injection, database securit...

2014
Donald Ray Jay Ligatti

This paper defines and analyzes injection attacks. The definition is based on the NIE property, which states that an application’s untrusted inputs must only produce Noncode Insertions or Expansions in output programs (e.g., SQL queries). That is, when applications generate output programs based on untrusted inputs, the NIE property requires that inputs only affect output programs by inserting ...

2007
William G. J. Halfond Alessandro Orso

We depend on database-driven web applications for an ever increasing amount of activities, such as banking and shopping. When performing such activities, we entrust our personal information to these web applications and their underlying databases. The confidentiality and integrity of this information is far from guaranteed; web applications are often vulnerable to attacks, which can give an att...

1999
F. W. Jones

The tracking and simulation code Accsim has recently been upgraded with new treatments of transverse space charge, one based on a conventional multiple-Fourier-transform technique and another using a new hybrid-fast-multipole (HFM) method. We present the application of the code to the study of multiturn injection in the CERN PS Booster in its LHC-injector-chain operation scenario. In particular...

2015
Anastasios Stasinopoulos Christoforos Ntantogian Christos Xenakis

Command injections are prevalent to any application independently of its operating system that hosts the application or the programming language that the application itself is developed.The impact of command injection attacks ranges from loss of data confidentiality and integrity to unauthorized remote access to the system that hosts the vulnerable application. A prime example of a real, infamo...

2014
Bojken Shehu Aleksander Xhuvani

SQL injection is a technique that exploits a security vulnerability occurring in the database layer of an application. The attack takes advantage of poor input validation in code and website administration. It allows attackers to obtain unauthorized access to the back-and database to change the intended application generated SQL queries. Researchers have proposed various solutions to address SQ...

2015
Yashanjot Singh Parminder Kaur

Sql injection are one of the topmost threats for application written for the Web. In sql injection attacker gains an unauthorized access to the DB and some malicious codes are injected into it. This paper deals with web security as well as security techniques. To better counter these attack various techniques for detection and and prevention of SQL injection attack are identified in this paper ...

Journal: :IEEE Computer 1997
Jeffrey M. Voas Gary McGraw Lora Kassab Larry Voas

Software fault injection is an emerging technology that can be used to observe how software systems behave under experimentally controlled anomalous circumstances In so doing software fault injection acts as a crystal ball predicting how badly software might behave should things go awry both internally and externally during execution Such predictions provide clues as to how robust a piece of co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید