Code injection

Results: 406



#Item
401Computer programming / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Stack / Call stack / Subroutine / Pointer / Return-to-libc attack / Software bugs / Computing / Software engineering

Enlisting Hardware Architecture to Thwart Malicious Code Injection Ruby B. Lee, David K. Karig, John P. McGregor, and Zhijie Shi

Add to Reading List

Source URL: palms.ee.princeton.edu

Language: English - Date: 2004-07-02 15:00:06
402

´ Evaluation de l’injection de code malicieux dans

Add to Reading List

Source URL: actes.sstic.org

Language: French - Date: 2013-06-27 13:08:53
    403Cross-site scripting / Code injection / SQL injection / Cross-site request forgery / Directory traversal attack / Nmap / Internet Information Services / HTTP response splitting / Software / Cyberwarfare / Computing

    Network Monitoring for Web-Based Threats

    Add to Reading List

    Source URL: www.sei.cmu.edu

    Language: English - Date: 2011-02-08 16:55:18
    404Computer network security / Software testing / Application security / Electronic commerce / Cross-site scripting / Vulnerability / OWASP / Code injection / Penetration test / Computer security / Cyberwarfare / Security

    PDF Document

    Add to Reading List

    Source URL: www.moital.gov.il

    Language: English - Date: 2012-11-01 03:55:42
    405Portable software / JavaScript / Client honeypot / Buffer overflow / Malware / Firefox / Code injection / World Wide Web / Opera / Software / Shellcode / Heap spraying

    PDF Document

    Add to Reading List

    Source URL: www.iseclab.org

    Language: English - Date: 2009-04-17 06:08:26
    406File hosting / Cryptographic protocols / Secure communication / Online backup services / Dropbox / Transport Layer Security / Dropship / HTTP Secure / Code injection / Software / Computing / Data synchronization

    PDF Document

    Add to Reading List

    Source URL: archive.hack.lu

    Language: English - Date: 2012-10-24 11:25:27
    UPDATE