2018 8th International Conference on Cloud Computing, Data Science &Amp; Engineering (Confluence) 2018
DOI: 10.1109/confluence.2018.8443032
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Code Injection Attacks in Mobile Cloud Computing Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…Nodes, an alternative term for sensors, are susceptible to node-capturing attacks, in which a malicious node is substituted for the original node or the node is captured. The attacker can introduce malicious or fake code into the node through an over-the-air firmware or software upgrade, resulting in incidents of fake data injection incidents or fraudulent code injection [14]. There is no built-in security at all for these sensors and actuators.…”
Section: A Physical Layermentioning
confidence: 99%
See 1 more Smart Citation
“…Nodes, an alternative term for sensors, are susceptible to node-capturing attacks, in which a malicious node is substituted for the original node or the node is captured. The attacker can introduce malicious or fake code into the node through an over-the-air firmware or software upgrade, resulting in incidents of fake data injection incidents or fraudulent code injection [14]. There is no built-in security at all for these sensors and actuators.…”
Section: A Physical Layermentioning
confidence: 99%
“…Malicious code injection into the memory of a node is termed malicious code injection, also known as MCI or fake data injection attacks [19], [14]. These nodes may be used as a gateway for a variety of unauthorized activities, including providing false information and breaking into or taking over a whole Internet of Things network.…”
Section: ) Malicious Code Injection Attackmentioning
confidence: 99%
“…They also addressed the theme XSS, Chin and Wagner attacks [7] and the work presented by Nisha and Bhanu [8], focusing on Android applications using WebView and IOS applications that used UIWebView in the development of mobile applications, the study also addressed how efficient existing solutions are in this type of attack.…”
Section: Structurementioning
confidence: 99%
“…To avoid this type of attack [8], the developer must appropriately sanitize inputs received from the client side by removing characters, terms related to HTML, Javascript, or SQL code from the input.…”
Section: Injectionmentioning
confidence: 99%