15,094 Hits in 6.3 sec

Devising Solution to SQL Injection Attacks

Ruta Pathak, Ananta Bhatt, Shivam Choudhary
2016 International Journal of Computer Applications  
SQL injection attacks occur due to vulnerabilities in the design of queries where a malicious user can take advantage of input opportunities to insert code in the queries that modify the query-conditions  ...  There is no. of web application vulnerabilities such as SQL injection, Buffer overflow etc. Above these SQL Injection vulnerabilities are very harmful for web applications.  ...  Hotspot Hot spot is that line where it gets the input from the user and vulnerable in execution. This performs a simple scanning of the application code to identify hotspots.  ... 
doi:10.5120/ijca2016912037 fatcat:za5lzd73njeujajcx2lsdfzl7u

Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic [article]

Benjamin J. Radford and Bartley D. Richardson and Shawn E. Davis
2018 arXiv   pre-print
We borrow from the natural language processing literature and conceptualize flow as a sort of "language" spoken between machines.  ...  For sequence modeling, we rely on long short-term memory (LSTM) recurrent neural networks (RNN).  ...  When the set of possible vulnerabilities is welldefined, detection is a matter of maintaining software that can scan systems and networks for the signatures of actors exploiting those vulnerabilities.  ... 
arXiv:1805.03735v2 fatcat:epsjmiyp7zeqzdpq5oik5mpa54

Sensitive detection of extremely small iron oxide nanoparticles in living mice using MP2RAGE with advanced image co-registration

Joong H. Kim, Stephen Dodd, Frank Q. Ye, Andrew K. Knutsen, Duong Nguyen, Haitao Wu, Shiran Su, Simone Mastrogiacomo, Thomas J. Esparza, Rolf E. Swenson, David L. Brody
2021 Scientific Reports  
The comparison of two T1 (or R1) maps after image co-registration provided precise and quantitative assessment of the effects of the injected ESIONPs at each voxel.  ...  Two independent MP2RAGE MR scans were performed pre- and post-injection of ESIONPs followed by advanced image co-registration.  ...  Acknowledgements This research was supported by the Intramural Research Program of the NIH, NINDS. Additional support was provided by the Uniformed Services University of the Health Sciences.  ... 
doi:10.1038/s41598-020-80181-9 pmid:33420210 fatcat:3kz62jb7vne7hej3loiyikebwq

Rapid and Proactive Approach on Exploration of Vulnerabilities in Cloud based Operating Systems

S. Ramachandran, A. Ramachandran
2012 International Journal of Computer Applications  
The vulnerabilities inherent in the Cloud systems should be addressed so they can be eliminated before exploited by malicious software or hackers.  ...  Our approach plays a major role in detecting and managing vulnerabilities present in the Cloud infrastructure. Implementation of this methodology proves to be cost effective and saves analyzing time .  ...  Modifying the system boot sequence requires a high level of privilege or an easily duped user.  ... 
doi:10.5120/5674-7711 fatcat:cu7y3bumyzerdkouclcwv3qh4y

ROP payload detection using speculative code execution

Michalis Polychronakis, Angelos D. Keromytis
2011 2011 6th International Conference on Malicious and Unwanted Software  
The prevalence of code injection attacks has led to the wide adoption of exploit mitigations based on nonexecutable memory pages.  ...  Our technique speculatively drives the execution of code that already exists in the address space of a targeted process according to the scanned input data, and identifies the execution of valid ROP code  ...  Acknowledgments This work was supported in part by the US Air Force, DARPA, and the NSF through Contracts AFRL-  ... 
doi:10.1109/malware.2011.6112327 dblp:conf/malware/PolychronakisK11 fatcat:pjsam7jukbfl7ksbv6l2ylry5e

A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools

Song-Yi Hwang, Jeong-Nyeo Kim
2021 Sensors  
In this paper, we propose a malware simulation tool that scans vulnerable IoT devices assigned a private IP address, and spreads malicious code within IoT infrastructure by injecting malicious code download  ...  With the expansion of the Internet of Things (IoT), security incidents about exploiting vulnerabilities in IoT devices have become prominent.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21216983 pmid:34770290 pmcid:PMC8588292 fatcat:3p32zwplnng6xlnoplc6ar3oze

Evaluating the Readiness of Cyber Resilient Bangladesh

Touhid Bhuiyan, Delwar Alam, Tanjila Farah
2015 Journal of Internet Technology and Secured Transaction  
However the dependency on digitization increases vulnerabilities and risks including cybercrimes such as hacking, intrusion, fraud, harassment and more.  ...  Digitization is a fundamental driver of development and economic growth of the world in both urbanized and emerging markets.  ...  Scanning: Vulnerability scanning is a process to recognize weaknesses of targeted web services, network, and applications.  ... 
doi:10.20533/jitst.2046.3723.2015.0051 fatcat:7so6pb6wifgophfu6w7ivqsfju

VinJect: Sızma Testi ve Güvenlik Açığı Taraması Aracı

2018 Düzce Üniversitesi Bilim ve Teknoloji Dergisi  
Sustainability of commercial systems is ensured through the regular scans of vulnerability.  ...  This article describes the architecture of the software named VinJect, which is developed for efficient penetration testing and vulnerability scanning.  ...  ACKNOWLEDGEMENTS: Author would like to thank Ali Rıza Selçuk for his assistance in testing the WinJect application. VII. REFERENCES [1] L. Allen, T. Heriyanto, and S.  ... 
doi:10.29130/dubited.425414 fatcat:b4cyphxeczhq3p6upxqeow7he4

Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners [article]

Andrea Valenza, Gabriele Costa, Alessandro Armando
2020 arXiv   pre-print
Our methodology is based on a novel attacker model where the scan author becomes the victim of a counter-strike.  ...  We developed a working prototype, called RevOK, and we applied it to 78 scanning systems. Out of them, 36 were found vulnerable to XSS.  ...  We implemented our methodology and we applied our prototype RevOK to 78 real-world scanning systems. Our experiments resulted in the discovery of 36 new vulnerabilities.  ... 
arXiv:2006.09769v1 fatcat:lyaiuqd5yvamnods5n7j4ci6fa

64Cu-DOTATATE PET/MRI for Detection of Activated Macrophages in Carotid Atherosclerotic PlaquesSignificance

Sune Folke Pedersen, Benjamin Vikjær Sandholt, Sune Høgild Keller, Adam Espe Hansen, Andreas Ettrup Clemmensen, Henrik Sillesen, Liselotte Højgaard, Rasmus Sejersten Ripa, Andreas Kjær
2015 Arteriosclerosis, Thrombosis and Vascular Biology  
Sources of Funding The unrestricted financial support from the Danish Heart Foundation, the Research Foundation of Rigshospitalet, the Danish Medical Research Council, and the John and Birthe Meyer Foundation  ...  Acknowledgments The expertise and technical support of principal technicians Karin Stahr and Jakup Poulsen with positron emission tomography (PET)/ MRI procedures and PET reconstructions are highly valued  ...  In addition, we aimed to establish the optimal time to wait from tracer injection to image acquisition.  ... 
doi:10.1161/atvbaha.114.305067 pmid:25977567 pmcid:PMC4479665 fatcat:ge6vsipm7bdb7ghvp6dnbrnsvy

Discovering and exploiting 802.11 wireless driver vulnerabilities

Laurent Butti, Julien Tinnés
2007 Journal in Computer Virology  
Lastly, we will detail the successful exploitation of the first 802.11 remote kernel stack overflow under Linux (madwifi driver).  ...  In this paper, we expose our research results on 802.11 driver vulnerabilities by focusing on the design and implementation of a fully featured 802.11 fuzzer that enabled us to find several critical implementation  ...  for his analysis of Microsoft Windows based vulnerabilities, Franck Veysset and Matthieu Maupetit for their second reading.  ... 
doi:10.1007/s11416-007-0065-x fatcat:i5nbjbhto5dvhlglekl7qhpvry

IL-6-targeted ultrasmall superparamagnetic iron oxide nanoparticles for optimized MRI detection of atherosclerotic vulnerable plaques in rabbits

Huaqiang Mo, Chenxing Fu, Zhiye Wu, Peng Liu, Zhibo Wen, Qingqing Hong, Yanbin Cai, Gongxin Li
2020 RSC Advances  
Herein, we report Anti-IL-6-USPIO for detecting IL-6 in inflammatory macrophages and MR imaging vulnerable plaques of atherosclerosis in rabbit, which would provide a novel non-invasive strategy for evaluating  ...  Acknowledgements This research is supported by the National Natural Science  ...  MR was scanned at 24 h and 48 h aer injection.  ... 
doi:10.1039/c9ra10509c fatcat:gkv3w5rphvgrpn7bo62aucivsi

Study the Best PenTest Algorithm for Blind SQL Injection Attacks

Aldebaran Bayu Nugroho, Satria Mandala
2020 International Journal on Information and Communication Technology (IJoICT)  
<p>There are several types of SQL injection attacks. One of the most popular SQL Injection Attacks is Blind SQL.  ...  This research provides solutions to the problems above by developing the automation of a blind SQL injection attack.  ...  Based on the data sequence of hexadecimal numbers used, the Binary Search algorithm is the most optimal algorithm. 3.  ... 
doi:10.21108/ijoict.2019.52.268 fatcat:k5kfsswu7ngsdecxgudm4iyqby

CMR Assessment of endothelial damage and angiogenesis in porcine coronary arteries using gadofosveset

Steen Fjord Pedersen, Samuel A Thrysoe, William P Paaske, Troels Thiem, Erling Falk, Steffen Ringgard, Won Y Kim
2011 Journal of Cardiovascular Magnetic Resonance  
Post contrast, CMR showed contrast enhancement of the coronary arteries with a selective and time-dependent average expansion of the injured LAD segment area of 45% (p = 0.04; CI 95 = [15%-75%]), indicating  ...  Between one -12 days (average four) after balloon injury, in vivo and ex vivo T1-weighted coronary CMR was performed after intravenous injection of gadofosveset.  ...  Acknowledgements The work was made possible with grants from: Foundation of Aase and Ejnar Danielsen, Denmark; Foundation of Torben and Alice Frimodts, Denmark; Foundation of Civil Engineer Frode V.  ... 
doi:10.1186/1532-429x-13-10 pmid:21269470 pmcid:PMC3036628 fatcat:tej7isg7irat5nztl4i4bhog7e

Cross-Site Scripting Guardian: A Static XSS Detector Based on Data Stream Input-Output Association Mining

Chenghao Li, Yiding Wang, Changwei Miao, Cheng Huang
2020 Applied Sciences  
We analyzed the operation sequence of source code and built a model to acquire the information that is most closely related to the XSS attack in the data stream.  ...  Our classification model achieved an F1 score of 0.92, a recall rate of 0.98 (vulnerable sample), and an area under curve (AUC) of 0.97 on the test dataset.  ...  Acknowledgments: This work was completed under the guidance of Cheng Huang of Sichuan University, China. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app10144740 fatcat:sxfriasfebg7dmdwensjzilnqi
« Previous Showing results 1 — 15 out of 15,094 results