Login / Signup
Using instruction block signatures to counter code injection attacks.
Milena Milenkovic
Aleksandar Milenkovic
Emil Jovanov
Published in:
SIGARCH Comput. Archit. News (2005)
Keyphrases
</>
injection attacks
sql injection
web applications
recommender systems
instruction scheduling
binary codes
collaborative recommender systems
countermeasures
security issues
database
data mining
web pages
low cost
operating system
security vulnerabilities