Sciweavers

42 search results - page 2 / 9
» The essence of command injection attacks in web applications
Sort
View
ISSRE
2008
IEEE
13 years 11 months ago
Automated Fix Generator for SQL Injection Attacks
A critical problem facing today’s internet community is the increasing number of attacks exploiting flaws found in Web applications. This paper specifically targets input valida...
Fred Dysart, Mark Sherriff
CCS
2009
ACM
13 years 8 months ago
Filter-resistant code injection on ARM
Code injections attacks are one of the most powerful and important classes of attacks on software. In such attacks, the attacker sends malicious input to a software application, w...
Yves Younan, Pieter Philippaerts, Frank Piessens, ...
JIPS
2010
162views more  JIPS 2010»
12 years 11 months ago
Intercepting Filter Approach to Injection Flaws
The growing number of web applications in the global economy has made it critically important to develop secure and reliable software to support the economy's increasing depen...
Ahmed Salem
USS
2008
13 years 7 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
ICSE
2009
IEEE-ACM
13 years 11 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...