Defining code-injection attacks
From MaRDI portal
Publication:2942871
DOI10.1145/2103656.2103678zbMATH Open1321.68035OpenAlexW4243518384MaRDI QIDQ2942871FDOQ2942871
Authors: Donald Ray, Jay Ligatti
Publication date: 11 September 2015
Published in: Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/2103656.2103678
Recommendations
- Abstract code injection. A semantic approach based on abstract non-interference
- Applied Cryptography and Network Security
- The essence of command injection attacks in web applications
- Preventing injection attacks with syntax embeddings
- Boolean formulas for the static identification of injection attacks in Java
Cited In (9)
- The essence of command injection attacks in web applications
- A novel method for SQL injection attack detection based on removing SQL query attribute values
- Preventing injection attacks with syntax embeddings
- Title not available (Why is that?)
- Bug attacks
- Boolean formulas for the static identification of injection attacks in Java
- Formal methods for web security
- Applied Cryptography and Network Security
- Abstract code injection. A semantic approach based on abstract non-interference
This page was built for publication: Defining code-injection attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2942871)