BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
injection
Google injection

Tag #injection

113 papers:

ASEASE-2019-Zhang #approach #identification #machine learning #sql
A Machine Learning Based Approach to Identify SQL Injection Vulnerabilities (KZ), pp. 1286–1288.
ESEC-FSEESEC-FSE-2019-StallenbergP #detection #named #search-based #web #xml
JCOMIX: a search-based tool to detect XML injection vulnerabilities in web applications (DMS, AP), pp. 1090–1094.
CASECASE-2019-PotluriD #detection #learning #performance #process
Deep Learning based Efficient Anomaly Detection for Securing Process Control Systems against Injection Attacks (SP, CD), pp. 854–860.
FASEFASE-2019-Boronat #dependence #model transformation
Offline Delta-Driven Model Transformation with Dependency Injection (AB), pp. 134–150.
ASEASE-2018-Traini #distributed #effectiveness #fault #framework #multi #performance
A multi-objective framework for effective performance fault injection in distributed systems (LT), pp. 936–939.
ICSTICST-2018-KhosrowjerdiMR #approach #machine learning #testing
Virtualized-Fault Injection Testing: A Machine Learning Approach (HK, KM, AR), pp. 297–308.
VMCAIVMCAI-2018-BuroM #approach #semantics
Abstract Code Injection - A Semantic Approach Based on Abstract Non-Interference (SB, IM), pp. 116–137.
ASEASE-2017-LeeHR #all about #detection #process #semantics
All about activity injection: threats, semantics, and detection (SL, SH, SR), pp. 252–262.
ESEC-FSEESEC-FSE-2017-ThomeSBB #named
JoanAudit: a tool for auditing common injection vulnerabilities (JT, LKS, DB, LCB), pp. 1004–1008.
ICSE-2017-ChristakisEG0 #framework
A general framework for dynamic stub injection (MC, PE, PG, PM0), pp. 586–596.
ICSTICST-2017-JanNAB #approach #search-based #testing #web #xml
A Search-Based Testing Approach for XML Injection Vulnerabilities in Web Applications (SJ, CDN, AA, LCB), pp. 356–366.
ICSTICST-2017-JeongLKKH #embedded #fault #framework #kernel #linux #named
FIFA: A Kernel-Level Fault Injection Framework for ARM-Based Embedded Linux System (EJ, NL, JK, DK, SH), pp. 23–34.
ICPCICPC-2016-OguraYHHK #detection #exclamation #java
Hey! Are you injecting side effect?: A tool for detecting purity changes in java methods (NO, JY, KH, YH, SK), pp. 1–3.
ASEASE-2016-CeccatoNAB #automation #black box #named #security #testing
SOFIA: an automated security oracle for black-box testing of SQL-injection vulnerabilities (MC, CDN, DA, LCB), pp. 167–177.
CASECASE-2016-WiebeRRV #approach #automation #composition #delivery #fault #generative #simulation #testing #using
Automated test suite generation to test modular designed packaging machines using Fault Injection and a simulink-based simulation approach (FW, SR, SR, BVH), pp. 758–765.
CSLCSL-2016-Carvalho #exponential #linear #logic #multi #relational
The Relational Model Is Injective for Multiplicative Exponential Linear Logic (DdC), p. 19.
SIGMODSIGMOD-2015-AlvaroRH #fault
Lineage-driven Fault Injection (PA, JR, JMH), pp. 331–346.
HaskellHaskell-2015-StolarekJE #haskell #product line
Injective type families for Haskell (JS, SLPJ, RAE), pp. 118–128.
ICEISICEIS-v2-2015-KustersMT #agile #development #fault
The Impact of Lean Techniques on Factors Influencing Defect Injection in Software Development (RJK, FMM, JJMT), pp. 412–419.
ICSEICSE-v1-2015-WinterSNSC #fault #parallel
No PAIN, No Gain? The Utility of PArallel Fault INjections (SW, OS, RN, NS, DC), pp. 494–505.
ICSTICST-2015-AppeltNB #question #sql
Behind an Application Firewall, Are We Safe from SQL Injection Attacks? (DA, CDN, LCB), pp. 1–10.
ISSTAISSTA-2015-CongLYX #automation #fault #robust #testing
Automatic fault injection for driver robustness testing (KC, LL, ZY, FX), pp. 361–372.
CBSECBSE-2014-HorcasPF #architecture #quality #variability
Injecting quality attributes into software architectures with the common variability language (JMH, MP, LF), pp. 35–44.
SANERCSMR-WCRE-2014-Heing-BeckerKS #developer
Bit-error injection for software developers (MHB, TK, SS), pp. 434–439.
SIGIRSIGIR-2014-FerranteFM #markov #modelling #precise
Injecting user models and time into precision via Markov chains (MF, NF, MM), pp. 597–606.
SACSAC-2014-ShahriarH #assessment #fuzzy #risk management #using
Risk assessment of code injection vulnerabilities using fuzzy logic-based system (HS, HH), pp. 1164–1170.
DACDAC-2014-Bhushan #predict #visual notation
A Rigorous Graphical Technique for Predicting Sub-harmonic Injection Locking in LC Oscillators (PB), p. 8.
DATEDATE-2014-LiuSXL #programmable #thread
Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy (ZL, WS, SX, ZL), pp. 1–6.
DATEDATE-2014-PapadimitriouHBML #clustering #fault #modelling #multi #towards
A multiple fault injection methodology based on cone partitioning towards RTL modeling of laser attacks (AP, DH, VB, PM, RL), pp. 1–4.
DATEDATE-2014-ZussaDTDMGCT #detection #fault #performance
Efficiency of a glitch detector against electromagnetic fault injection (LZ, AD, KT, JMD, PM, LGS, JC, AT), pp. 1–6.
ICSTICST-2014-PotetMPD #approach #control flow #evaluation #named #robust
Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections (MLP, LM, MP, LD), pp. 213–222.
ISSTAISSTA-2014-AppeltNBA #approach #automation #sql #testing
Automated testing for SQL injection vulnerabilities: an input mutation approach (DA, CDN, LCB, NA), pp. 259–269.
ISSTAISSTA-2014-LanzaroNWCS #empirical #fault #interface
An empirical study of injected versus actual interface errors (AL, RN, SW, DC, NS), pp. 397–408.
CoGCIG-2013-BallingerL #robust #using
Finding robust strategies to defeat specific opponents using case-injected coevolution (CAB, SJL), pp. 1–8.
OOPSLAOOPSLA-2013-Zhang0K #developer #evolution #fault #locality
Injecting mechanical faults to localize developer faults for evolving software (LZ, LZ, SK), pp. 765–784.
ICSEICSE-2013-ScharfA #diagrams #editing #sketching
Dynamic injection of sketching features into GEF based diagram editors (AS, TA), pp. 822–831.
ICSEICSE-2013-SharTB #hybrid #mining #program analysis #sql #using
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis (LKS, HBKT, LCB), pp. 642–651.
DACDAC-2013-ChoMCAM #design #evaluation #fault #robust
Quantitative evaluation of soft error injection techniques for robust system design (HC, SM, CYC, JAA, SM), p. 10.
VLDBVLDB-2012-BoldiBGT #graph #nondeterminism #obfuscation
Injecting Uncertainty in Graphs for Identity Obfuscation (PB, FB, AG, TT), pp. 1376–1387.
ICEISICEIS-v2-2012-RychlyZ #fault
Fault Injection for Web-services (MR, MZ), pp. 377–383.
CIKMCIKM-2012-CaiZ #learning #rank
Variance maximization via noise injection for active sampling in learning to rank (WC, YZ), pp. 1809–1813.
POPLPOPL-2012-RayL
Defining code-injection attacks (DR, JL), pp. 179–190.
ICSEICSE-2012-SharT #mining #predict #sql
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities (LKS, HBKT), pp. 1293–1296.
CASECASE-2012-LangC0W #3d #assembly
Injection system for cellular assembly of 3D bio-tissue engineered constructs (ML, XC, WW, TBFW), pp. 291–296.
CASECASE-2012-LiuS #modelling #validation
Modeling and experimental validation of air-fuel ratio under individual cylinder fuel injection for port-injection engines (YL, TS), pp. 256–260.
CASECASE-2012-ParkPC #automation #design
Design automation of valve gate locations and open timing for injection molding of an automotive instrument panel (CHP, BGP, DHC), pp. 843–845.
DATEDATE-2012-MohammadiEEM #fault #named
SCFIT: A FPGA-based fault injection technique for SEU fault model (AM, ME, AE, SGM), pp. 586–589.
DATEDATE-2012-NeogyR #analysis #design
Analysis and design of sub-harmonically injection locked oscillators (AN, JSR), pp. 1209–1214.
PDPPDP-2012-SterponeSR #approach #fault #testing
A New Fault Injection Approach for Testing Network-on-Chips (LS, DS, MSR), pp. 530–535.
ITiCSEITiCSE-2011-TaylorK #security #student
Security injections: modules to help students remember, understand, and apply secure coding techniques (BT, SK), pp. 3–7.
HCIHCI-UA-2011-Furukawa #design #question #what
What Label Design of Ampule for Injection, Do You Want? (HF), pp. 159–166.
OOPSLAOOPSLA-2011-JoshiGS #multi #named #programmable
PREFAIL: a programmable tool for multiple-failure injection (PJ, HSG, KS), pp. 171–188.
TOOLSTOOLS-EUROPE-2011-SchwarzLN #dependence #named
Seuss: Better Class Responsibilities through Language-Based Dependency Injection (NS, ML, ON), pp. 276–289.
CASECASE-2011-MikosFG #agile #approach #distributed #process #reasoning
A distributed system for rapid determination of nonconformance causes and solutions for the thermoplastic injection molding process: A Case-Based Reasoning Agents approach (WLM, JCEF, FGCG), pp. 755–760.
DACDAC-2011-BailisRGBS #named
Dimetrodon: processor-level preventive thermal management via idle cycle injection (PB, VJR, SG, DMB, MIS), pp. 89–94.
HPDCHPDC-2011-LeonRFM #parallel
Cache injection for parallel applications (EAL, RR, KBF, ABM), pp. 15–26.
CSMRCSMR-2010-RoubtsovSB #composition #dependence #detection #java #smell
Detecting Modularity “Smells” in Dependencies Injected with Java Annotations (SAR, AS, MvdB), pp. 244–247.
FLOPSFLOPS-2010-NishidaS #proving #term rewriting
Proving Injectivity of Functions via Program Inversion in Term Rewriting (NN, MS), pp. 288–303.
CHICHI-2010-LankST #documentation #fault #using
Estimating residual error rate in recognized handwritten documents using artificial error injection (EL, RS, MAT), pp. 1–4.
CIKMCIKM-2010-SlezakT #database
Injecting domain knowledge into a granular database engine: a position paper (DS, GT), pp. 1913–1916.
ICPRICPR-2010-BecattiniMC
Anisotropic Contour Completion for Cell Microinjection Targeting (GB, LSM, DGC), pp. 2262–2265.
QAPLQAPL-2010-CacheraJ #abstract interpretation #cost analysis #linear #modelling
Injecting Abstract Interpretations into Linear Cost Models (DC, AJ), pp. 64–81.
GPCEGPCE-J-2007-BravenboerDV10 #syntax
Preventing injection attacks with syntax embeddings (MB, ED, EV), pp. 473–495.
DACDAC-2010-LishernessC #fault #named
SCEMIT: a systemc error and mutation injection tool (PL, KT(C), pp. 228–233.
ICEISICEIS-DISI-2009-DunkelFOO #architecture #semantics
Injecting Semantics into Event-driven Architectures (JD, AF, RO, SO), pp. 70–75.
CIKMCIKM-2009-SunWL #trust
Injecting purpose and trust into data anonymisation (XS, HW, JL), pp. 1541–1544.
ICSEICSE-2009-KiezunGJE #automation #sql
Automatic creation of SQL Injection and cross-site scripting attacks (AK, PJG, KJ, MDE), pp. 199–209.
SACSAC-2009-LiuYWS #architecture #named #sql #towards
SQLProb: a proxy-based architecture towards preventing SQL injection attacks (AL, YY, DW, AS), pp. 2054–2061.
DATEDATE-2009-LeveugleCMV #fault #quantifier #statistics
Statistical fault injection: Quantified error and confidence (RL, AC, PM, PV), pp. 502–506.
DATEDATE-2009-ZabelM #simulation
Increased accuracy through noise injection in abstract RTOS simulation (HZ, WM), pp. 1632–1637.
KRKR-2008-HinrichsG #finite #how #logic #what
Injecting the How into the What: Investigating a Finite Classical Logic (TLH, MRG), pp. 92–192.
SEKESEKE-2008-HittleG #fault #file system #testing #using
Fault Injection Testing of User-space File Systems Using Traditional and Aspect-based Techniques (JH, SG), pp. 873–876.
SACSAC-2008-KemalisT #approach #detection #named
SQL-IDS: a specification-based approach for SQL-injection detection (KK, TT), pp. 2153–2158.
DATEDATE-2008-GouraryRUZMG #analysis
Analysis of Oscillator Injection Locking by Harmonic Balance Method (MMG, SGR, SLU, MMZ, BJM, KKG), pp. 318–323.
DATEDATE-2008-KeezerMD #multi
Variable Delay of Multi-Gigahertz Digital Signals for Deskew and Jitter-Injection Test Applications (DCK, DM, PD), pp. 1486–1491.
CSMRCSMR-2007-MerloLA #automation #php
Automated Protection of PHP Applications Against SQL-injection Attacks (EM, DL, GA), pp. 191–202.
HCIHCI-AS-2007-Furukawa #challenge #effectiveness #fault #question #what
Challenge for Preventing Medication Errors -Learn from Errors- : What Is the Most Effective Label Display to Prevent Medication Error for Injectable Drug ? (HF), pp. 437–442.
PLDIPLDI-2007-WassermannS #analysis #precise #web
Sound and precise analysis of web applications for injection vulnerabilities (GW, ZS), pp. 32–41.
SACSAC-2007-Holland #scheduling
Injection/withdrawal scheduling for natural gas storage facilities (AH), pp. 332–333.
SACSAC-2007-JohnsB #approximate #automation #named #web
SMask: preventing injection attacks in web applications by approximating automatic data/code separation (MJ, CB), pp. 284–291.
GPCEGPCE-2007-BravenboerDV #syntax
Preventing injection attacks with syntax embeddings (MB, ED, EV), pp. 3–12.
CASECASE-2007-WangLS #using
Autonomous Zebrafish Embryo Injection Using a Microrobotic System (WW, XL, YS), pp. 363–368.
DACDAC-2007-AmbroseRP #analysis #named #random
RIJID: Random Code Injection to Mask Power Analysis based Side Channel Attacks (JAA, RGR, SP), pp. 489–492.
SIGMODSIGMOD-2006-KiferG #dataset
Injecting utility into anonymized datasets (DK, JG), pp. 217–228.
WCREWCRE-2006-MerloLA #analysis #php #sql
Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHP (EM, DL, GA), pp. 147–156.
FMFM-2006-ArthoBH #named #performance
Enforcer — Efficient Failure Injection (CA, AB, SH), pp. 412–427.
POPLPOPL-2006-SuW #web
The essence of command injection attacks in web applications (ZS, GW), pp. 372–382.
FSEFSE-2006-HalfondOM #evaluation #sql #using
Using positive tainting and syntax-aware evaluation to counter SQL injection attacks (WGJH, AO, PM), pp. 175–185.
ICSEICSE-2006-HalfondO #sql #using
Preventing SQL injection attacks using AMNESIA (WGJH, AO), pp. 795–798.
PDPPDP-2006-IzuMG #network #throughput
Effects of Injection Pressure on Network Throughput (CI, JMA, JAG), pp. 91–98.
STOCSTOC-2006-AngluinACW #learning
Learning a circuit by injecting values (DA, JA, JC, YW), pp. 584–593.
DocEngDocEng-2005-HaralambousB
Injecting information into atomic units of text (YH, GB), pp. 134–142.
CoGCIG-2005-MilesL #game studies #realtime
Case-Injection Improves Response Time for a Real-Time Strategy Game (CM, SJL).
ECOOPECOOP-2005-ChibaI #aspect-oriented #dependence #programming
Aspect-Oriented Programming Beyond Dependency Injection (SC, RI), pp. 121–143.
ASEASE-2005-HalfondO #analysis #monitoring #named
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks (WGJH, AO), pp. 174–183.
GTTSEGTTSE-2005-HeuzerothATK #aspect-oriented #composition
The COMPOST, COMPASS, Inject/J and RECODER Tool Suite for Invasive Software Composition: Invasive Composition with COMPASS Aspect-Oriented Connectors (DH, UA, MT, VK), pp. 357–377.
DACDAC-2005-DililloGPVB #analysis #comparison #fault
Resistive-open defect injection in SRAM core-cell: analysis and comparison between 0.13 µm and 90 nm technologies (LD, PG, SP, AV, MB), pp. 857–862.
VLDBVLDB-2004-MayerGKT
An Injection of Tree Awareness: Adding Staircase Join to PostgreSQL (SM, TG, MvK, JT), pp. 1305–1308.
PEPMPEPM-2004-Shapiro
Invited talk: injecting life with computers (EYS), p. 200.
PPDPPPDP-2004-Shapiro
Invited talk: injecting life with computers (EYS), p. 6.
SASSAS-2004-Shapiro
Injecting Life with Computers (EYS), p. 1.
DATEDATE-v1-2004-LeveugleA #fault
Early SEU Fault Injection in Digital, Analog and Mixed Signal Circuits: A Global Flow (RL, AA), pp. 590–595.
FATESFATES-2004-YoonKSC #analysis #component #empirical #fault #mutation testing #testing #using
Testing COM Components Using Software Fault Injection and Mutation Analysis, and Its Empirical Study (HY, EK, JS, BC), pp. 210–224.
FATESFATES-2003-SungC #embedded #fault #hardware #interactive #testing #using
Interaction Testing in an Embedded System Using Hardware Fault Injection and Program Mutation (AS, BC), pp. 192–204.
DATEDATE-2002-BerrojoGCRSEL
New Techniques for Speeding-Up Fault-Injection Campaigns (LB, IG, FC, MSR, GS, LE, CL), pp. 847–852.
TOOLSTOOLS-USA-2001-Ghosh #distributed #fault #object-oriented #testing
Fault Injection Testing for Distributed Object Systems (SG), pp. 276–285.
GPCEGCSE-2001-GregorSM
Base Class Injection (DG, SS, DRM), pp. 106–117.
DATEDATE-2001-BensoCNP #analysis #distributed #fault #open source
SEU effect analysis in an open-source router via a distributed fault injection environment (AB, SDC, GDN, PP), pp. 219–225.
ICGTTAGT-1998-HabelMP #approach
Double-Pushout Approach with Injective Matching (AH, JM, DP), pp. 103–116.
DATEDATE-1998-Velasco-MedinaCN #detection #fault #linear #using
Fault Detection for Linear Analog Circuits Using Current Injection (JVM, TC, MN), pp. 987–988.
PDPPDP-1998-FlorioDTRL #distributed #embedded #fault tolerance #hypermedia #monitoring #parallel #source code
A hypermedia distributed application for monitoring and fault-injection in embedded fault-tolerant parallel programs (VDF, GD, MT, WR, RL), pp. 349–355.
ASF+SDFASF+SDF-1995-Dinesh
Injection Misdemeanors (TBD), pp. 255–270.
SACSAC-1994-Negoita #fuzzy #logic #realtime
Fuzzy logic real-time intelligent control of fuel injection engines (MGN), pp. 110–114.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.