Code injection

Results: 406



#Item
11APEx: Automated Inference of Error Specifications for C APIs Yuan Kang Baishakhi Ray

APEx: Automated Inference of Error Specifications for C APIs Yuan Kang Baishakhi Ray

Add to Reading List

Source URL: rayb.info

Language: English - Date: 2016-08-08 22:22:30
12Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2005-09-25 18:44:49
13HITB Magazine Keeping Knowledge Free Volume 1, Issue 1, JanuaryCover Story

HITB Magazine Keeping Knowledge Free Volume 1, Issue 1, JanuaryCover Story

Add to Reading List

Source URL: magazine.hitb.org

Language: English - Date: 2014-01-06 00:11:33
14I Control Your Code Attack Vectors through the Eyes of Software-based Fault Isolation Mathias Payer <>

I Control Your Code Attack Vectors through the Eyes of Software-based Fault Isolation Mathias Payer <>

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
15Safe Loading A Foundation for Secure Execution of Untrusted Programs Mathias Payer, Tobias Hartmann, Thomas R. Gross Department of Computer Science

Safe Loading A Foundation for Secure Execution of Untrusted Programs Mathias Payer, Tobias Hartmann, Thomas R. Gross Department of Computer Science

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
16String Oriented Programming: When ASLR is not enough Mathias Payer* and Thomas R. Gross Department of Computer Science ETH Zürich, Switzerland

String Oriented Programming: When ASLR is not enough Mathias Payer* and Thomas R. Gross Department of Computer Science ETH Zürich, Switzerland

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
17TxBox: Building Secure, Efficient Sandboxes with System Transactions Suman Jana The University of Texas at Austin   Donald E. Porter

TxBox: Building Secure, Efficient Sandboxes with System Transactions Suman Jana The University of Texas at Austin Donald E. Porter

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2011-03-07 14:32:49
18Code-Injection Attacks in Browsers Supporting Policies Elias Athanasopoulos, Vasilis Pappas, and Evangelos P. Markatos Institute of Computer Science Foundation for Research and Technology - Hellas N. Plastira 100, Vassil

Code-Injection Attacks in Browsers Supporting Policies Elias Athanasopoulos, Vasilis Pappas, and Evangelos P. Markatos Institute of Computer Science Foundation for Research and Technology - Hellas N. Plastira 100, Vassil

Add to Reading List

Source URL: users.ics.forth.gr

Language: English - Date: 2010-11-23 05:43:53
    19PreparedJS: Secure Script-Templates for JavaScript Martin Johns SAP Research  Abstract. Content Security Policies (CSP) provide powerful means to

    PreparedJS: Secure Script-Templates for JavaScript Martin Johns SAP Research Abstract. Content Security Policies (CSP) provide powerful means to

    Add to Reading List

    Source URL: dl.dropboxusercontent.com

    Language: English