Stopping injection attacks with code and structured data
Tirronen, V. (2018). Stopping injection attacks with code and structured data. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Power and Technology (pp. 219-231). Springer. Intelligent Systems, Control and Automation : Science and Engineering, 93. https://doi.org/10.1007/978-3-319-75307-2_13
Julkaistu sarjassa
Intelligent Systems, Control and Automation : Science and EngineeringTekijät
Päivämäärä
2018Tekijänoikeudet
© Springer International Publishing AG, part of Springer Nature 2018
Injection attacks top the lists of the most harmful software vulnerabilities. Injection vulnerabilities are both commonplace and easy to exploit, which makes development of injection protection schemes important. In this article, we show how injection attacks can be practically eliminated through the use of structured data paired with cryptographic verification codes upon transmission.
Julkaisija
SpringerEmojulkaisun ISBN
978-3-319-75306-5Kuuluu julkaisuun
Cyber Security : Power and TechnologyISSN Hae Julkaisufoorumista
2213-8986Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/28046354
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Lisenssi
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Using Hypervisors to Overcome Structured Exception Handler Attacks
Algawi, Asaf; Kiperberg, Michael; Leon, Roee; Zaidenberg, Nezer (Academic Conferences International, 2019)Microsoft windows is a family of client and server operating systems that needs no introduction. Microsoft windows operating system family has a feature to handle exceptions by storing in the stack the address of an ... -
Reducing the Time to Detect Cyber Attacks : Combining Attack Simulation With Detection Logic
Myllyla, Juuso; Costin, Andrei (FRUCT Oy, 2021)Cyber attacks have become harder to detect, causing the average detection time of a successful data breach to be over six months and typically costing the target organization nearly four million dollars. The attacks are ... -
Transport layer DDoS attack types and mitigation methods in networks
Zudin, Rodion (2015)Hajautetut palvelunestohyökkäykset ovat olleet kasvava uhka yrityksille jotka käyttävät tietoverkkoihin perustuvia elementtejä tietojärjestelmissään. Viime aikoina eivät pelkästään liikeyritykset, vaan myös poliittiset ... -
Unsupervised network intrusion detection systems for zero-day fast-spreading network attacks and botnets
Vahdani Amoli, Payam (University of Jyväskylä, 2015)Today, the occurrence of zero-day and complex attacks in high-speed networks is increasingly common due to the high number vulnerabilities in the cyber world. As a result, intrusions become more sophisticated and fast ... -
On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds
Zolotukhin, Mikhail; Ivannikova, Elena; Hämäläinen, Timo (Springer International Publishing, 2017)Modern cloud environments allow users to consume computational and storage resources in the form of virtual machines. Even though machines running on the same cloud server are logically isolated from each other, a ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.