ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Implementation of Attack on Harvard Architecture Devices by Code Injection
International Journal of Computer Applications
◽
10.5120/1268-1722
◽
2010
◽
Vol 7
(8)
◽
pp. 38-43
Author(s):
Amey P. Asgaonkar
Keyword(s):
Code Injection
◽
Harvard Architecture
Download Full-text
Related Documents
Cited By
References
Code injection attacks on harvard-architecture devices
Proceedings of the 15th ACM conference on Computer and communications security - CCS '08
◽
10.1145/1455770.1455775
◽
2008
◽
Cited By ~ 117
Author(s):
Aurélien Francillon
◽
Claude Castelluccia
Keyword(s):
Injection Attacks
◽
Code Injection
◽
Harvard Architecture
Download Full-text
Preventing SQL Code Injection by Combining Static and Runtime Analysis
10.21236/ada482932
◽
2008
◽
Author(s):
Alessandro Orso
◽
Wenke Lee
◽
Adam Shostack
Keyword(s):
Runtime Analysis
◽
Code Injection
Download Full-text
Characterizing, exploiting, and detecting DMA code injection vulnerabilities in the presence of an IOMMU
Proceedings of the Sixteenth European Conference on Computer Systems
◽
10.1145/3447786.3456249
◽
2021
◽
Author(s):
Markuze Alex
◽
Shay Vargaftik
◽
Gil Kupfer
◽
Boris Pismeny
◽
Nadav Amit
◽
...
Keyword(s):
Code Injection
Download Full-text
Code Injection
Securing SQL Server
◽
10.1007/978-1-4842-4161-5_13
◽
2018
◽
pp. 307-324
Author(s):
Peter A. Carter
Keyword(s):
Code Injection
Download Full-text
GMSA: Gathering Multiple Signatures Approach to Defend Against Code Injection Attacks
IEEE Access
◽
10.1109/access.2018.2884201
◽
2018
◽
Vol 6
◽
pp. 77829-77840
◽
Cited By ~ 2
Author(s):
Hussein Alnabulsi
◽
Rafiqul Islam
◽
Majharul Talukder
Keyword(s):
Injection Attacks
◽
Code Injection
Download Full-text
Harvard architecture pushes microcontroller IC into high-speed realm
Microelectronics Journal
◽
10.1016/s0026-2692(88)80206-4
◽
1988
◽
Vol 19
(1)
◽
pp. 55
Keyword(s):
High Speed
◽
Harvard Architecture
Download Full-text
Filter-resistant code injection on ARM
Proceedings of the 16th ACM conference on Computer and communications security - CCS '09
◽
10.1145/1653662.1653665
◽
2009
◽
Cited By ~ 7
Author(s):
Yves Younan
◽
Pieter Philippaerts
◽
Frank Piessens
◽
Wouter Joosen
◽
Sven Lachmund
◽
...
Keyword(s):
Code Injection
Download Full-text
An Architectural Approach to Preventing Code Injection Attacks
IEEE Transactions on Dependable and Secure Computing
◽
10.1109/tdsc.2010.1
◽
2010
◽
Vol 7
(4)
◽
pp. 351-365
◽
Cited By ~ 14
Author(s):
Ryan Riley
◽
Xuxian Jiang
◽
Dongyan Xu
Keyword(s):
Injection Attacks
◽
Code Injection
Download Full-text
Detecting code injection by cross-validating stack and VAD information in windows physical memory
2017 IEEE Conference on Open Systems (ICOS)
◽
10.1109/icos.2017.8280279
◽
2017
◽
Author(s):
Anurag Srivastava
◽
James H. Jones
Keyword(s):
Code Injection
Download Full-text
VirISA: Recruiting Virtualization and Reconfigurable Processor ISA for Malicious Code Injection Protection
Components and Services for IoT Platforms
◽
10.1007/978-3-319-42304-3_7
◽
2016
◽
pp. 117-130
Author(s):
Apostolos P. Fournaris
◽
Georgios Keramidas
◽
Kyriakos Ispoglou
◽
Nikolaos Voros
Keyword(s):
Malicious Code
◽
Reconfigurable Processor
◽
Code Injection
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close