Code Injection (German Wikipedia)

Analysis of information sources in references of the Wikipedia article "Code Injection" in German language version.

refsWebsite
Global rank German rank
33rd place
2nd place
low place
low place
1st place
1st place
2nd place
3rd place
355th place
290th place
low place
low place
1,514th place
1,509th place
low place
low place
123rd place
6th place
low place
low place
6th place
40th place
low place
low place
4,194th place
3,914th place
low place
low place
3,018th place
low place
low place
low place
153rd place
269th place
14th place
31st place

archive.org

  • Brian Hope, Paco Hope, Ben Walther: Web Security Testing Cookbook. O’Reilly Media, Sebastopol CA 2009, ISBN 978-0-596-51483-9, S. 254 (englisch, Online).

archive.today

die.net

linux.die.net

doi.org

  • Lecture Notes in Computer Science, Jose Andre Morales, Ravi Sandhu, Shouhuai Xu, Erhan Kartaltepe. Springer, Berlin / Heidelberg 2010, ISBN 978-3-642-14705-0, Symptoms-Based Detection of Bot Processes, doi:10.1007/978-3-642-14706-7_18 (englisch).
  • Pieter Philippaerts, Yves Younan, Stijn Muylle, Frank Piessens, Sven Lachmund, Thomas Walter: CPM: Masking Code Pointers to Prevent Code Injection Attacks. In: ACM Transactions on Information and System Security. Band 16, Nr. 1, 1. Juni 2013, ISSN 1094-9224, S. 1–27, doi:10.1145/2487222.2487223 (englisch, Online [PDF]).

fort-knox.org

  • Pieter Philippaerts, Yves Younan, Stijn Muylle, Frank Piessens, Sven Lachmund, Thomas Walter: CPM: Masking Code Pointers to Prevent Code Injection Attacks. In: ACM Transactions on Information and System Security. Band 16, Nr. 1, 1. Juni 2013, ISSN 1094-9224, S. 1–27, doi:10.1145/2487222.2487223 (englisch, Online [PDF]).

karmainsecurity.com

microsoft.com

msdn.microsoft.com

moertel.com

blog.moertel.com

nist.gov

web.nvd.nist.gov

oracle.com

docs.oracle.com

owasp.org

php.net

uk3.php.net

rafalcieslak.wordpress.com

redirecter.toolforge.org

  • Top 10 Web Application Security Vulnerabilities. In: Penn Computing. University of Pennsylvania, archiviert vom Original am 24. Februar 2018; abgerufen am 10. Dezember 2016 (englisch).
  • Raghunathan Srinivasan: Towards More Effective Virus Detectors. In: Arizona State University. Archiviert vom Original am 29. Juli 2010; abgerufen am 18. September 2010 (englisch): „Benevolent use of code injection occurs when a user changes the behaviour of a program to meet system requirements.“
  • Command Injection. Archiviert vom Original am 27. Februar 2015; abgerufen am 27. Februar 2015 (englisch).

seclists.org

uiowa.edu

cs.uiowa.edu

web.archive.org

  • Top 10 Web Application Security Vulnerabilities. In: Penn Computing. University of Pennsylvania, archiviert vom Original am 24. Februar 2018; abgerufen am 10. Dezember 2016 (englisch).
  • Raghunathan Srinivasan: Towards More Effective Virus Detectors. In: Arizona State University. Archiviert vom Original am 29. Juli 2010; abgerufen am 18. September 2010 (englisch): „Benevolent use of code injection occurs when a user changes the behaviour of a program to meet system requirements.“

zdb-katalog.de

  • Pieter Philippaerts, Yves Younan, Stijn Muylle, Frank Piessens, Sven Lachmund, Thomas Walter: CPM: Masking Code Pointers to Prevent Code Injection Attacks. In: ACM Transactions on Information and System Security. Band 16, Nr. 1, 1. Juni 2013, ISSN 1094-9224, S. 1–27, doi:10.1145/2487222.2487223 (englisch, Online [PDF]).