Stopping injection attacks with code and structured data
Tirronen, V. (2018). Stopping injection attacks with code and structured data. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Power and Technology (pp. 219-231). Springer. Intelligent Systems, Control and Automation : Science and Engineering, 93. https://doi.org/10.1007/978-3-319-75307-2_13
Authors
Date
2018Copyright
© Springer International Publishing AG, part of Springer Nature 2018
Injection attacks top the lists of the most harmful software vulnerabilities. Injection vulnerabilities are both commonplace and easy to exploit, which makes development of injection protection schemes important. In this article, we show how injection attacks can be practically eliminated through the use of structured data paired with cryptographic verification codes upon transmission.
Publisher
SpringerParent publication ISBN
978-3-319-75306-5Is part of publication
Cyber Security : Power and TechnologyISSN Search the Publication Forum
2213-8986Publication in research information system
https://converis.jyu.fi/converis/portal/detail/Publication/28046354
Metadata
Show full item recordCollections
License
Related items
Showing items with similar title or keywords.
-
Using Hypervisors to Overcome Structured Exception Handler Attacks
Algawi, Asaf; Kiperberg, Michael; Leon, Roee; Zaidenberg, Nezer (Academic Conferences International, 2019)Microsoft windows is a family of client and server operating systems that needs no introduction. Microsoft windows operating system family has a feature to handle exceptions by storing in the stack the address of an ... -
Reducing the Time to Detect Cyber Attacks : Combining Attack Simulation With Detection Logic
Myllyla, Juuso; Costin, Andrei (FRUCT Oy, 2021)Cyber attacks have become harder to detect, causing the average detection time of a successful data breach to be over six months and typically costing the target organization nearly four million dollars. The attacks are ... -
Transport layer DDoS attack types and mitigation methods in networks
Zudin, Rodion (2015)Hajautetut palvelunestohyökkäykset ovat olleet kasvava uhka yrityksille jotka käyttävät tietoverkkoihin perustuvia elementtejä tietojärjestelmissään. Viime aikoina eivät pelkästään liikeyritykset, vaan myös poliittiset ... -
Unsupervised network intrusion detection systems for zero-day fast-spreading network attacks and botnets
Vahdani Amoli, Payam (University of Jyväskylä, 2015)Today, the occurrence of zero-day and complex attacks in high-speed networks is increasingly common due to the high number vulnerabilities in the cyber world. As a result, intrusions become more sophisticated and fast ... -
IoT -based adversarial attack's effect on cloud data platform services in a smart building context
Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Academic Conferences International, 2020)IoT sensors and sensor networks are widely employed in businesses. The common problem is a remarkable number of IoT device transactions are unencrypted. Lack of correctly implemented and robust defense leaves the organization's ...