Code injection

Results: 406



#Item
21Emulab Federation Design “Levels”  Federation of Emulabs and Relevant New Development

Emulab Federation Design “Levels” Federation of Emulabs and Relevant New Development

Add to Reading List

Source URL: www.cs.utah.edu

Language: English - Date: 2006-12-12 16:29:47
22Concurrency Attacks Junfeng Yang, Ang Cui, Sal Stolfo, Simha Sethumadhavan {junfeng, ang, sal, simha}cs.columbia.edu Department of Computer Science Columbia University

Concurrency Attacks Junfeng Yang, Ang Cui, Sal Stolfo, Simha Sethumadhavan {junfeng, ang, sal, simha}cs.columbia.edu Department of Computer Science Columbia University

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2016-01-23 22:11:32
23Code Injection Attacks on HTML5-based Mobile Apps Xing Jin, Tongbo Luo, Derek G. Tsui, Wenliang Du Dept. of Electrical Engineering & Computer Science, Syracuse University, Syracuse, NY  using different languages. If othe

Code Injection Attacks on HTML5-based Mobile Apps Xing Jin, Tongbo Luo, Derek G. Tsui, Wenliang Du Dept. of Electrical Engineering & Computer Science, Syracuse University, Syracuse, NY using different languages. If othe

Add to Reading List

Source URL: www.mostconf.org

Language: English - Date: 2014-05-17 09:18:13
    24Mitigating Smart Card Fault Injection with Link-time Code Rewriting: a Feasibility Study Jonas Maebe, Ronald De Keulenaer, Bjorn De Sutter, and Koen De Bosschere Computer Systems Lab, Ghent University {jmaebe,rdkeulen,br

    Mitigating Smart Card Fault Injection with Link-time Code Rewriting: a Feasibility Study Jonas Maebe, Ronald De Keulenaer, Bjorn De Sutter, and Koen De Bosschere Computer Systems Lab, Ghent University {jmaebe,rdkeulen,br

    Add to Reading List

    Source URL: fc13.ifca.ai

    Language: English - Date: 2013-03-27 20:42:00
      2525 Million Flows Later - Large-scale Detection of DOM-based XSS Sebastian Lekies Ben Stock

      25 Million Flows Later - Large-scale Detection of DOM-based XSS Sebastian Lekies Ben Stock

      Add to Reading List

      Source URL: ben-stock.de

      Language: English - Date: 2013-09-09 06:37:05
      26Business Logic Security Ilia Alshanetsky @iliaa https://joind.in/14863  whois: Ilia Alshanetsky

      Business Logic Security Ilia Alshanetsky @iliaa https://joind.in/14863 whois: Ilia Alshanetsky

      Add to Reading List

      Source URL: ilia.ws

      Language: English - Date: 2015-09-26 04:23:31
      27

      PDF Document

      Add to Reading List

      Source URL: jburket.com

      Language: English - Date: 2015-04-07 23:18:11
      28Microsoft Word - CWEs_as_vuln_theory.doc

      Microsoft Word - CWEs_as_vuln_theory.doc

      Add to Reading List

      Source URL: cwe.mitre.org

      Language: English - Date: 2007-07-18 14:25:17
      29Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

      Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

      Add to Reading List

      Source URL: www.spacios.eu

      Language: English - Date: 2012-10-11 06:26:07
      30How to Secure Your Website 5th Edition Approaches to Improve Web Application and Website Security

      How to Secure Your Website 5th Edition Approaches to Improve Web Application and Website Security

      Add to Reading List

      Source URL: www.ipa.go.jp

      Language: English - Date: 2013-07-09 23:13:11