咨询与建议

限定检索结果

文献类型

  • 42 篇 会议
  • 30 篇 期刊文献
  • 5 篇 科技报告
  • 3 篇 学位论文

馆藏范围

  • 80 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 65 篇 工学
    • 57 篇 计算机科学与技术...
    • 20 篇 电气工程
    • 17 篇 软件工程
    • 15 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 4 篇 仪器科学与技术
    • 3 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
  • 8 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 3 篇 公共管理
    • 3 篇 图书情报与档案管...
  • 7 篇 理学
    • 3 篇 数学
    • 3 篇 化学
    • 2 篇 生物学
    • 1 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 80 篇 code injection
  • 11 篇 security
  • 9 篇 malware
  • 5 篇 deep learning
  • 5 篇 machine learning
  • 5 篇 sql injection
  • 4 篇 detection
  • 4 篇 cybersecurity
  • 4 篇 computer program...
  • 4 篇 web application
  • 3 篇 reliability
  • 3 篇 operating system...
  • 3 篇 architecture
  • 3 篇 computer program...
  • 3 篇 secure memory ar...
  • 3 篇 monitoring
  • 3 篇 web applications
  • 3 篇 reverse engineer...
  • 3 篇 android
  • 3 篇 language

机构

  • 3 篇 tsinghua univ gr...
  • 2 篇 china elect stan...
  • 2 篇 carnegie-mellon ...
  • 2 篇 baskent univ com...
  • 2 篇 air force life c...
  • 2 篇 ankara univ arti...
  • 2 篇 guangdong univ f...
  • 1 篇 wuhan text univ ...
  • 1 篇 univ chester dep...
  • 1 篇 athena res ctr a...
  • 1 篇 univ calif river...
  • 1 篇 ernw res gmbh he...
  • 1 篇 univ leuven disr...
  • 1 篇 univ toronto on
  • 1 篇 national aerospa...
  • 1 篇 chongqing polyte...
  • 1 篇 ggsip univ delhi...
  • 1 篇 the university o...
  • 1 篇 arm res austin t...
  • 1 篇 univ passau inns...

作者

  • 3 篇 yan ruibo
  • 3 篇 xiao xi
  • 3 篇 peng sancheng
  • 2 篇 lee jae-myeong
  • 2 篇 riley ryan
  • 2 篇 parameswaran sri
  • 2 篇 younan yves
  • 2 篇 johns martin
  • 2 篇 patel krutartha
  • 2 篇 abaimov stanisla...
  • 2 篇 ugurlu guney
  • 2 篇 ye runguo
  • 2 篇 li qing
  • 2 篇 hong sugwon
  • 2 篇 xu dongyan
  • 2 篇 piessens frank
  • 2 篇 acici koray
  • 2 篇 jiang yong
  • 2 篇 bianchi giuseppe
  • 2 篇 ntantogian chris...

语言

  • 77 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"主题词=code injection"
80 条 记 录,以下是1-10 订阅
排序:
Understanding and Measuring Inter-process code injection in Windows Malware  19th
Understanding and Measuring Inter-process Code Injection in ...
收藏 引用
19th International Conference on Security and Privacy in Communication Networks
作者: Starink, Jerre Huisman, Marieke Peter, Andreas Continella, Andrea Univ Twente Enschede Netherlands Carl von Ossietzky Univ Oldenburg Oldenburg Germany
Malware aims to stay undetected for as long as possible. One common method for avoiding or delaying detection is the use of code injection, by which a malicious process injects code into another running application. D... 详细信息
来源: 评论
An Architectural Approach to Preventing code injection Attacks
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2010年 第4期7卷 351-365页
作者: Riley, Ryan Jiang, Xuxian Xu, Dongyan Qatar Univ Dept Comp Sci & Engn POB 2713 Doha Qatar N Carolina State Univ Dept Comp Sci Raleigh NC 27695 USA Purdue Univ Dept Comp Sci W Lafayette IN 47907 USA Purdue Univ CERIAS W Lafayette IN 47907 USA
code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the execute-disable bit and PaX have been useful in limiting the attacks;however, they enfo... 详细信息
来源: 评论
New deep learning method to detect code injection attacks on hybrid applications
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2018年 137卷 67-77页
作者: Yan, Ruibo Xiao, Xi Hu, Guangwu Peng, Sancheng Jiang, Yong Tsinghua Univ Grad Sch Shenzhen Shenzhen Peoples R China Shenzhen Inst Informat Technol Sch Comp Sci Shenzhen Peoples R China Guangdong Univ Foreign Studies Sch Informat Guangzhou Guangdong Peoples R China
Mobile phones are becoming increasingly pervasive. Among them, HTML5-based hybrid applications are more and more popular because of their portability on different systems. However these applications suffer from code i... 详细信息
来源: 评论
Monitoring Translation Lookahead Buffers to Detect code injection Attacks
收藏 引用
COMPUTER 2014年 第7期47卷 66-72页
作者: Ahn, Youngjung Lee, Yongsuk Choi, Jin-Young Lee, Gyungho Ahn, Dongkyun Korea Univ Dept Comp Sci & Engn Seoul South Korea Korea Univ Seoul South Korea
By identifying memory pages that external I/O operations have modified, a proposed scheme blocks malicious injected code activation, accurately distinguishing an attack from legitimate code injection with negligible p... 详细信息
来源: 评论
code injection Attacks on HTML5-based Mobile Apps: Characterization, Detection and Mitigation  14
Code Injection Attacks on HTML5-based Mobile Apps: Character...
收藏 引用
21st ACM Conference on Computer and Communications Security (CCS)
作者: Jin, Xing Hu, Xunchao Ying, Kailiang Du, Wenliang Yin, Heng Peri, Gautam Nagesh SUNY Syracuse Dept Elect Engn & Comp Sci Syracuse NY 13210 USA
Due to the portability advantage, HTML5-based mobile apps are getting more and more popular. Unfortunately, the web technology used by HTML5-based mobile apps has a dangerous feature, which allows data and code to be ... 详细信息
来源: 评论
An Architectural approach to preventing code injection attacks
An Architectural approach to preventing code injection attac...
收藏 引用
37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
作者: Riley, Ryan Jiang, Xuxian Xu, Dongyan Purdue Univ W Lafayette IN 47907 USA George Mason Univ Fairfax VA 22030 USA
code injection attacks, despite being well researched, continue to be a problem today. Modern architectural solutions such as the NX-bit and PaX have been useful in limiting the attacks, however they enforce program l... 详细信息
来源: 评论
Toward the Analysis of Distributed code injection in Post-mortem Forensics  14th
Toward the Analysis of Distributed Code Injection in Post-mo...
收藏 引用
14th International Workshop on Security (IWSEC)
作者: Otsuki, Yuto Kawakoya, Yuhei Iwamura, Makoto Miyoshi, Jun Faires, Jacob Lillard, Terrence NTT Secure Platform Labs 3-9-11 Midoricho Musashino Tokyo 1808585 Japan NTT Secur US Inc 9420 Underwood Ave Omaha NE 68114 USA
Distributed code injection is a new type of malicious code injection technique. It makes existing forensics techniques for injected code detection infeasible by splitting a malicious code into several code snippets, i... 详细信息
来源: 评论
Detection and Prevention of code injection Attacks on HTML5-based Apps  3
Detection and Prevention of Code Injection Attacks on HTML5-...
收藏 引用
3rd International Conference on Advanced Cloud and Big Data (CBD)
作者: Xiao, Xi Yan, Ruibo Ye, Runguo Li, Qing Peng, Sancheng Jiang, Yong Tsinghua Univ Grad Sch Shenzhen Shenzhen Peoples R China China Elect Standardizat Inst Beijing Peoples R China Zhaoqing Univ Sch Comp Sci Zhaoqing Peoples R China
Security on mobile devices is becoming increasingly important. HTML5 are widely used to develop mobile applications due to its portability on multi platforms. However it is allowed to mix data and code together in web... 详细信息
来源: 评论
A methodology for designing countermeasures against current and future code injection attacks  3
A methodology for designing countermeasures against current ...
收藏 引用
3rd IEEE International Workshop on Information Assurance
作者: Younan, Y Joosen, W Piessens, F Katholieke Univ Leuven Dept Comp Sci B-3001 Louvain Belgium
This paper proposes a methodology to develop countermeasures against code injection attacks, and validates the methodology by working out a specific countermeasure. This methodology is based on modeling the execution ... 详细信息
来源: 评论
Security Standards Perspective to Fortify Web Database Applications From code injection Attacks
Security Standards Perspective to Fortify Web Database Appli...
收藏 引用
UKSim/AMSS 1st International Conference on Intelligent Systems, Modelling and Simulation
作者: Madan, Sushila Madan, Supriya Univ Delhi Dept Comp Sci Lady ShriRam Coll Women Delhi 110007 India GGSIP Univ Delhi Vivekananda Inst Profess Studies Dept Comp Sci New Delhi India
In recent years, web application security has become the primary discussion for security experts, as application attacks are constantly on rise and posing new risks for organizations. Several trends have emerged latel... 详细信息
来源: 评论