Code injection

Results: 406



#Item
81Scripting languages / Software testing / Ajax / JavaScript / Cross-platform software / Cross-site scripting / JSON / Cross-site request forgery / Code injection / Computing / Computer security / Cyberwarfare

FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications Prateek Saxena§ Steve Hanna§ Pongsin Poosankam‡§ Dawn Song§

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
82Scripting languages / Control flow / Eval / Functional programming / Programming paradigms / JavaScript / JSON / Dynamic programming language / Code injection / Computing / Software engineering / Computer programming

The Eval that Men Do A Large-scale Study of the Use of Eval in JavaScript Applications Gregor Richards Christian Hammer

Add to Reading List

Source URL: the.gregor.institute

Language: English - Date: 2014-09-17 17:38:08
83Espionage / Backdoor / Rootkit / Code injection / Veracode / Loadable kernel module / Hooking / Eval / Self-modifying code / Malware / System software / Cyberwarfare

Static Detection of Application Backdoors Chris Wysopal, Chris Eng Veracode, Inc. Burlington, MA USA [removed], [removed] Abstract— This paper describes a high level classification of

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2014-02-11 00:25:06
84Computer network security / Software testing / Cross-site scripting / Hacking / Cross-site request forgery / Vulnerability / Code injection / Penetration test / SQL injection / Computer security / Cyberwarfare / Computing

Damn Vulnerable Web App Ryan Dewhurst, Aralık 2009, WGT E-Dergi 3. Sayı I wanted an application developed in PHP/MySQL that was vulnerable to the most common types of web application vulnerabilities, that I could pract

Add to Reading List

Source URL: webguvenligi.org

Language: English - Date: 2011-08-03 19:42:25
85Cross-platform software / Scripting languages / Computer network security / Software testing / Cross-site scripting / PHP programming language / Code injection / SQL injection / Vulnerability / Computing / Cyberwarfare / Computer security

Journal of Computer Security[removed]–907 DOI[removed]JCS[removed]IOS Press 861

Add to Reading List

Source URL: iseclab.org

Language: English - Date: 2010-09-29 15:20:37
86Automatic identification and data capture / Barcodes / Communication software / Markup languages / PhoneGap / Mobile application development / JavaScript / HTML5 / Mobile operating system / Software / Computing / Scripting languages

Code Injection Attacks on HTML5-based Mobile Apps Xing Jin, Tongbo Luo, Derek G. Tsui, Wenliang Du Dept. of Electrical Engineering & Computer Science, Syracuse University, Syracuse, NY using different languages. If othe

Add to Reading List

Source URL: mostconf.org

Language: English - Date: 2014-05-17 09:18:13
87Cross-site scripting / JavaScript / Firefox / Chrome Web Store / Code injection / Internet Explorer / Principle of least privilege / Safari / Add-on / Software / Google Chrome / News aggregators

An Evaluation of the Google Chrome Extension Security Architecture Nicholas Carlini, Adrienne Porter Felt, and David Wagner University of California, Berkeley [removed], [removed], [removed]

Add to Reading List

Source URL: nicholas.carlini.com

Language: English - Date: 2013-10-16 18:28:56
88Database management systems / Computer languages / Data management / Scripting languages / Monica S. Lam / SQL / Code injection / Cross-site scripting / Java / Computing / Software engineering / Cross-platform software

Securing Web Applications with Static and Dynamic Information Flow Tracking Monica S. Lam Michael Martin

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2007-12-15 19:41:29
89Software engineering / SQL / SQL injection / Code injection / XQuery / JavaScript / Scannerless parsing / XPath / Computing / Data management / Query languages

Delft University of Technology Software Engineering Research Group Technical Report Series Preventing Injection Attacks with Syntax Embeddings

Add to Reading List

Source URL: swerl.tudelft.nl

Language: English - Date: 2007-02-05 11:40:47
90Computer network security / Software testing / Hacking / Vulnerability / Cross-site scripting / SQL injection / Code review / Software bug / Penetration test / Computer security / Cyberwarfare / Computing

An Empirical Study on the Effectiveness of Security Code Review Anne Edmundson1 , Brian Holtkamp2 , Emanuel Rivera3 , Matthew Finifter4 , Adrian Mettler4 , and David Wagner4 1 Cornell University, Ithaca, NY, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
UPDATE