Code injection

Results: 406



#Item
21Software testing / Software engineering / Computing / Testbed / PlanetLab / Exception handling / Code injection / Form

Emulab Federation Design “Levels” Federation of Emulabs and Relevant New Development

Add to Reading List

Source URL: www.cs.utah.edu

Language: English - Date: 2006-12-12 16:29:47
22Concurrent computing / Software bugs / Computer memory / Software testing / Edsger W. Dijkstra / Concurrency / Code injection / Computer security / Go / Lock / Thread / Parallel computing

Concurrency Attacks Junfeng Yang, Ang Cui, Sal Stolfo, Simha Sethumadhavan {junfeng, ang, sal, simha}cs.columbia.edu Department of Computer Science Columbia University

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2016-01-23 22:11:32
23

Code Injection Attacks on HTML5-based Mobile Apps Xing Jin, Tongbo Luo, Derek G. Tsui, Wenliang Du Dept. of Electrical Engineering & Computer Science, Syracuse University, Syracuse, NY using different languages. If othe

Add to Reading List

Source URL: www.mostconf.org

Language: English - Date: 2014-05-17 09:18:13
    24

    Mitigating Smart Card Fault Injection with Link-time Code Rewriting: a Feasibility Study Jonas Maebe, Ronald De Keulenaer, Bjorn De Sutter, and Koen De Bosschere Computer Systems Lab, Ghent University {jmaebe,rdkeulen,br

    Add to Reading List

    Source URL: fc13.ifca.ai

    Language: English - Date: 2013-03-27 20:42:00
      25Ajax / Hacking / Cross-site scripting / JavaScript / JSONP / JSON / HTTP cookie / Code injection / SQL injection / Exploit / Firefox / JQuery

      25 Million Flows Later - Large-scale Detection of DOM-based XSS Sebastian Lekies Ben Stock

      Add to Reading List

      Source URL: ben-stock.de

      Language: English - Date: 2013-09-09 06:37:05
      26Computer security / Cyberwarfare / Cryptography / Security / Password / Key management / Cross-site request forgery / Crypt / Passwd / SQL injection / Cross-site scripting / Code injection

      Business Logic Security Ilia Alshanetsky @iliaa https://joind.in/14863 whois: Ilia Alshanetsky

      Add to Reading List

      Source URL: ilia.ws

      Language: English - Date: 2015-09-26 04:23:31
      27Scripting languages / HTML / Cross-site scripting / Hacking / Form / SQL injection / Code injection / Ruby on Rails / String / Ruby / JavaScript / Taint checking

      PDF Document

      Add to Reading List

      Source URL: jburket.com

      Language: English - Date: 2015-04-07 23:18:11
      28Computer security / Buffer overflow / Heap overflow / Circular buffer / Integer overflow / Vulnerability / Code injection / Pointer / Stack overflow / Computing / Software bugs / Cyberwarfare

      Microsoft Word - CWEs_as_vuln_theory.doc

      Add to Reading List

      Source URL: cwe.mitre.org

      Language: English - Date: 2007-07-18 14:25:17
      29Failure / Cross-site scripting / Vulnerability / SQL injection / Fault injection / Dolev-Yao model / Model-based testing / Remote file inclusion / Code injection / Software testing / Cyberwarfare / Computer security

      Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

      Add to Reading List

      Source URL: www.spacios.eu

      Language: English - Date: 2012-10-11 06:26:07
      30Relational database management systems / Computer network security / Database management systems / Hacking / Software testing / SQL injection / Cross-site scripting / Vulnerability / Code injection / Computing / Cyberwarfare / Computer security

      How to Secure Your Website 5th Edition Approaches to Improve Web Application and Website Security

      Add to Reading List

      Source URL: www.ipa.go.jp

      Language: English - Date: 2013-07-09 23:13:11
      UPDATE