Sciweavers

188 search results - page 1 / 38
» Injectivity analysis using interval analysis: Application to...
Sort
View
AUTOMATICA
2008
97views more  AUTOMATICA 2008»
13 years 5 months ago
Injectivity analysis using interval analysis: Application to structural identifiability
This paper presents a new numerical algorithm based on interval analysis able to prove that a differentiable function f : A Rn Rn is injective. This algorithm also performs a par...
Sebastien Lagrange, Nicolas Delanoue, Luc Jaulin
COMPSAC
2007
IEEE
13 years 11 months ago
A Static Analysis Framework For Detecting SQL Injection Vulnerabilities
Recently SQL Injection Attack (SIA) has become a major threat to Web applications. Via carefully crafted user input, attackers can expose or manipulate the back-end database of a ...
Xiang Fu, Xin Lu, Boris Peltsverger, Shijun Chen, ...
ISSRE
2010
IEEE
13 years 3 months ago
Security Trend Analysis with CVE Topic Models
—We study the vulnerability reports in the Common Vulnerability and Exposures (CVE) database by using topic models on their description texts to find prevalent vulnerability typ...
Stephan Neuhaus, Thomas Zimmermann
WORM
2003
13 years 6 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
ICDE
2009
IEEE
129views Database» more  ICDE 2009»
14 years 4 days ago
A Static Analysis Framework for Database Applications
—Database developers today use data access APIs such as ADO.NET to execute SQL queries from their application. These applications often have security problems such as SQL injecti...
Arjun Dasgupta, Vivek R. Narasayya, Manoj Syamala