نتایج جستجو برای: code injection

تعداد نتایج: 323507  

Journal: :International Journal of Computer Applications 2012

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید چمران اهواز - دانشکده ادبیات و علوم انسانی 1386

the purpose of the present study is to find out whether bilinguals of khuzestan-arab origin or monolinguals of iranian origin code-switch during learning or speaking english and which group is more susceptible to code-switch. to this end, the students of 24 classes from high schools and pre- university centers were screened out, and interviewed and their voices and code-switchings were recorded...

2006
Yves Younan Frank Piessens Wouter Joosen

Many countermeasures exist to protect the stack and heap from code injection attacks, however very few countermeasures exist that will specifically protect global and static variables from attack. In this paper we suggest a way of protecting global and static variables from these type of attacks, with negligible performance and memory overheads. CR Subject Classification : K6.5, D3.4, D4.2

2017
Thomas Barabosch Niklas Bergmann Adrian Dombeck Elmar Padilla

Malware predominantly employs code injections, which allow to run code in the trusted context of another process. This enables malware, for instance, to secretly operate or to intercept critical information. It is crucial for analysts to quickly detect injected code. While there are systems to detect code injections in memory dumps, they suffer from unsatisfying detection rates or their detecti...

2015
YaFang Liu HaiPeng Qu

----------------------------------------------------------------------ABSTRACT----------------------------------------------------------False data injection attack is a serious threat to wireless sensor network. In this paper, a node legitimacy based false data filtering scheme (NLFS) is proposed. NLFS verifies not only message authentication codes (MACs) contains in reports, but also the legit...

2005
Yves Younan Wouter Joosen Frank Piessens Hans Van den Eynden

Most memory allocators ignore security issues. Instead they focus on maximizing performance and limiting fragmentation and waste. While these are very important issues for a memory allocator, in the days of worms that use code injection attacks to cause significant economical damage, security can not be ignored. This paper evaluates a representative set of commonly used memory allocators for C ...

2013
Thomas H. Morris Wei Gao

This paper presents a set of attacks against SCADA control systems. The attacks are grouped into 4 classes; reconnaissance, response and measurement injection, command injection and denial of service. The 4 classes are defined and each attack is described in detail. The response and measurement injection and command injection classes are subdivided into sub-classes based on attack complexity. E...

2009
Nathan Oostendorp Rahul Sami

In many web communities, users are assigned a reputation based on ratings on their past contributions, and this reputation in turn influences the recommendation level of their future contributions. In this type of system, there is potentially an incentive for authors to copy highly-rated content in order to boost their reputation and influence within the system. We describe this strategy as a c...

Journal: :JNW 2012
Zhiming Zhang Changgen Jiang

False data injection attack and PDoS (path-based Denial of Service) attack are serious threats in wireless sensor networks. Existing schemes can effectively resist false data injection and PDoS attacks, but most of them can not find out the compromised node when the base station or sink node detect the report is invalid. In this paper, we propose a false data injection-resilient security routin...

2013
Aditi Gupta Sam Kerr Michael S. Kirkpatrick Elisa Bertino

Code-reuse attacks, such as return-oriented programming (ROP), bypass defenses against code injection by repurposing existing executable code toward a malicious end. A common feature of these attacks is the reliance on the knowledge of the layout of the executable code. We propose a fine grained randomization based approach that modifies the layout of executable code and hinders code-reuse atta...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید