Code injection

Results: 406



#Item
31Shellcode / Malware / Software bugs / Hooking / Polymorphic code / Windows API / Code injection / Exploit / Application programming interface / Cyberwarfare / Computer security / Computing

Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2014-09-05 15:38:44
32

S HELL OS: Enabling Fast Detection and Forensic Analysis of Code Injection Attacks Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose Department of Computer Science University of North Carolina at Chapel Hill, {kzsnow, kri

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2014-09-05 15:38:44
    33Software testing / Software bugs / Hacking / Source code / Vulnerability / Attack patterns / Application security / Cross-site scripting / Code injection / Cyberwarfare / Computer security / Computing

    Microsoft Word - tcm_taxonomy_submission.doc

    Add to Reading List

    Source URL: cwe.mitre.org

    Language: English - Date: 2006-09-13 14:57:23
    34Chromatography / Separation processes / Laboratory techniques / Medical equipment / Drug paraphernalia / Syringe / Gas chromatography / Vernier Software & Technology / Injection / Chemistry / Science / Scientific method

    Vernier Mini GC Plus Gas Chromatograph (Order Code: GC2-MINI) Introduction The Vernier Mini GC Plus is an instrument for separating, analyzing, and identifying substances contained in a volatile liquid or

    Add to Reading List

    Source URL: www.vernier.com

    Language: English - Date: 2015-06-23 12:08:24
    35Cross-platform software / Computer security / Code injection / Machine code / Malware / Vulnerability scanner / Nmap / National Vulnerability Database / Ping / Software / Computing / System software

    Basic Web Security About Me • Working with Web Developer Since 1996
 • Working with Unix (FreeBSD, Linux) System Admin Since 1996

    Add to Reading List

    Source URL: ton.packetlove.com

    Language: English
    36Software testing / Hacking / Relational database management systems / Database management systems / Attack patterns / SQL injection / Vulnerability / Code injection / Buffer overflow / Cyberwarfare / Computing / Computer security

    CWECWE/SANS Top 25 Most Dangerous Software Errors

    Add to Reading List

    Source URL: cwe.mitre.org

    Language: English - Date: 2012-09-25 15:14:33
    37Computer network security / Software testing / Hacking / Vulnerability / Application security / Code injection / Qualys / Web application security / Acunetix / Computer security / Cyberwarfare / Computing

    Vulnerability Factors in New Web Applications: Audit Tools, Developer Selection & Languages Jason Bau, Frank Wang, Elie Bursztein, Patrick Mutchler, John C. Mitchell Stanford University Abstract—We develop a web appli

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2013-02-22 17:29:44
    38Computer network security / Software testing / Hacking / Vulnerability / CVSS / Cross-site scripting / Cross-site request forgery / Code injection / SQL injection / Cyberwarfare / Computer security / Computing

    Web Application Scan Document Revision Initial Report Prepared By: AppCheck-NG

    Add to Reading List

    Source URL: appcheck-ng.com

    Language: English - Date: 2014-09-08 05:22:28
    39Business / Industrial design / Injection molding / Skill / Mechanical engineering / Computer-aided design / Cylinder head porting / Technology / Plastics industry / Engineering

    JOB DESCRIPTION MOLD DESIGNER 2 DEPARTMENT: New ToolingSUPERVISOR: Manager of Tooling JOB CODE: mlddsg2

    Add to Reading List

    Source URL: www.keytronic.com

    Language: English - Date: 2014-09-25 11:03:11
    40Stack buffer overflow / Buffer overflow / Stack / Address space layout randomization / Memory address / Atmel AVR / Malware / Pointer / Transmission Control Protocol / Computing / Software bugs / Computer errors

    Code Injection Attacks on Harvard-Architecture Devices Aurélien Francillon Claude Castelluccia INRIA Rhône-Alpes

    Add to Reading List

    Source URL: planete.inrialpes.fr

    Language: English - Date: 2008-09-11 06:46:35
    UPDATE