咨询与建议

限定检索结果

文献类型

  • 42 篇 会议
  • 29 篇 期刊文献
  • 5 篇 科技报告
  • 3 篇 学位论文

馆藏范围

  • 79 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 64 篇 工学
    • 56 篇 计算机科学与技术...
    • 20 篇 电气工程
    • 17 篇 软件工程
    • 15 篇 信息与通信工程
    • 5 篇 控制科学与工程
    • 4 篇 仪器科学与技术
    • 3 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 石油与天然气工程
  • 8 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 3 篇 公共管理
    • 3 篇 图书情报与档案管...
  • 7 篇 理学
    • 3 篇 数学
    • 3 篇 化学
    • 2 篇 生物学
    • 1 篇 系统科学
    • 1 篇 科学技术史(分学科...
  • 2 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 79 篇 code injection
  • 10 篇 security
  • 9 篇 malware
  • 5 篇 deep learning
  • 5 篇 machine learning
  • 5 篇 sql injection
  • 4 篇 detection
  • 4 篇 cybersecurity
  • 4 篇 computer program...
  • 3 篇 reliability
  • 3 篇 operating system...
  • 3 篇 architecture
  • 3 篇 computer program...
  • 3 篇 secure memory ar...
  • 3 篇 monitoring
  • 3 篇 web applications
  • 3 篇 reverse engineer...
  • 3 篇 android
  • 3 篇 language
  • 3 篇 tensilica

机构

  • 3 篇 tsinghua univ gr...
  • 2 篇 china elect stan...
  • 2 篇 carnegie-mellon ...
  • 2 篇 baskent univ com...
  • 2 篇 air force life c...
  • 2 篇 ankara univ arti...
  • 2 篇 guangdong univ f...
  • 1 篇 wuhan text univ ...
  • 1 篇 univ chester dep...
  • 1 篇 athena res ctr a...
  • 1 篇 univ calif river...
  • 1 篇 ernw res gmbh he...
  • 1 篇 univ leuven disr...
  • 1 篇 univ toronto on
  • 1 篇 national aerospa...
  • 1 篇 chongqing polyte...
  • 1 篇 ggsip univ delhi...
  • 1 篇 the university o...
  • 1 篇 arm res austin t...
  • 1 篇 univ passau inns...

作者

  • 3 篇 yan ruibo
  • 3 篇 xiao xi
  • 3 篇 peng sancheng
  • 2 篇 lee jae-myeong
  • 2 篇 riley ryan
  • 2 篇 parameswaran sri
  • 2 篇 younan yves
  • 2 篇 patel krutartha
  • 2 篇 abaimov stanisla...
  • 2 篇 ugurlu guney
  • 2 篇 ye runguo
  • 2 篇 li qing
  • 2 篇 hong sugwon
  • 2 篇 xu dongyan
  • 2 篇 piessens frank
  • 2 篇 acici koray
  • 2 篇 jiang yong
  • 2 篇 bianchi giuseppe
  • 2 篇 ntantogian chris...
  • 2 篇 yin heng

语言

  • 76 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"主题词=code injection"
79 条 记 录,以下是31-40 订阅
排序:
Analysis of the adoption of security headers in HTTP
收藏 引用
IET INFORMATION SECURITY 2018年 第2期12卷 118-126页
作者: Buchanan, William J. Helme, Scott Woodward, Alan Edinburgh Napier Univ Cyber Acad Sch Comp Edinburgh Midlothian Scotland Univ Surrey Surrey Ctr Cyber Secur Guildford Surrey England
With the increase in the number of threats within web-based systems, a more integrated approach is required to ensure the enforcement of security policies from the server to the client. These policies aim to stop man-... 详细信息
来源: 评论
A Native APIs Protection Mechanism in the Kernel Mode against Malicious code
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2011年 第6期60卷 813-823页
作者: Sun, Hung-Min Wang, Hsun Wang, King-Hang Chen, Chien-Ming Natl Tsing Hua Univ Dept Comp Sci Hsinchu 300 Taiwan Hong Kong Inst Technol Hong Kong Hong Kong Peoples R China
As new vulnerabilities on Windows systems are reported endlessly, it is more practical to stop polymorphic malicious code from exploiting these vulnerabilities by building an behavior-based monitor, rather than adopti... 详细信息
来源: 评论
Randomized Instruction Sets and Runtime Environments Past Research and Future Directions
收藏 引用
IEEE SECURITY & PRIVACY 2009年 第1期7卷 18-25页
作者: Keromytis, Angelos D. Columbia Univ Dept Comp Sci New York NY 10027 USA Columbia Univ Network Secur Lab New York NY 10027 USA
The author describes past research and future directions on instruction set randomization (ISR), a general technique for protecting against code-injection attacks. Such attacks are commonly encountered in a variety of... 详细信息
来源: 评论
RASCv2: Enabling Remote Access to Side-Channels for Mission Critical and IoT Systems
收藏 引用
ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS 2022年 第6期27卷 1–25页
作者: Bai, Yunkai Stern, Andrew Park, Jungmin Tehranipoor, Mark Forte, Domenic Univ Florida 601 Gale Lemerand Dr Gainesville FL 32611 USA
The Internet of Things (IoT) and smart devices are currently being deployed in systems such as autonomous vehicles and medical monitoring devices. The introduction of IoT devices into these systems enables network con... 详细信息
来源: 评论
Commix: automating evaluation and exploitation of command injection vulnerabilities in Web applications
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2019年 第1期18卷 49-72页
作者: Stasinopoulos, Anastasios Ntantogian, Christoforos Xenakis, Christos Univ Piraeus Dept Digital Syst Karaoli & Dimitriou St 80 Piraeus 18534 Greece
Despite the prevalence and the high impact of command injection attacks, little attention has been given by the research community to this type of code injections. Although there are many software tools to detect and ... 详细信息
来源: 评论
On Architectural Support for Instruction Set Randomization
收藏 引用
ACM TRANSACTIONS ON ARCHITECTURE AND code OPTIMIZATION 2020年 第4期17卷 1–26页
作者: Christou, George Vasiliadis, Giorgos Papaefstathiou, Vassilis Papadogiannakis, Antonis Ioannidis, Sotiris Fdn Res & Technol Hellas FORTH ICS Iraklion Greece Tech Univ Crete TUC ECE Khania Greece
Instruction Set Randomization (ISR) is able to protect against remote code injection attacks by randomizing the instruction set of each process. Thereby, even if an attacker succeeds to inject code, it will fail to ex... 详细信息
来源: 评论
Exfiltrating data from Android devices
收藏 引用
COMPUTERS & SECURITY 2015年 48卷 74-91页
作者: Do, Quang Martini, Ben Choo, Kim-Kwang Raymond Univ S Australia Informat Assurance Res Grp Adelaide SA 5001 Australia
Modern mobile devices have security capabilities built into the native operating system, which are generally designed to ensure the security of personal or corporate data stored on the device, both at rest and in tran... 详细信息
来源: 评论
Safe Inspection of Live Virtual Machines  17
Safe Inspection of Live Virtual Machines
收藏 引用
13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE)
作者: Suneja, Sahil Koller, Ricardo Isci, Canturk de lara, Eyal Hashemi, Ali Bhattacharyya, Arnamoy Amza, Cristiana IBM TJ Watson Res Yorktown Hts NY 10598 USA Univ Toronto Toronto ON Canada
With DevOps automation and an everything-as-code approach to lifecycle management for cloud-native applications, challenges emerge from an operational visibility and control perspective. Once a VM is deployed in produ... 详细信息
来源: 评论
Host-Oriented Approach to Cyber Security for the SCADA Systems  6
Host-Oriented Approach to Cyber Security for the SCADA Syste...
收藏 引用
6th IEEE International Congress on Information Science and Technology (IEEE CiSt)
作者: Lee, Jae-Myeong Hong, Sugwon Myongji Univ Dept Comp Engn Yongin South Korea
Recent cyberattacks targeting Supervisory Control and Data Acquisition (SCADA)/Industrial Control System(ICS) exploit weaknesses of host system software environment and take over the control of host processes in the h... 详细信息
来源: 评论
Prison: Tracking Process Interactions to Contain Malware  17
Prison: Tracking Process Interactions to Contain Malware
收藏 引用
2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC)
作者: Caillat, Benjamin Gilbert, Bob Kemmerer, Richard Kruegel, Christopher Vigna, Giovanni Univ Calif Santa Barbara Santa Barbara CA 93106 USA Lastline Inc Redwood City CA 94065 USA
Modern operating systems provide a number of different mechanisms that allow processes to interact. These interactions can generally be divided into two classes: interprocess communication techniques, which a process ... 详细信息
来源: 评论