Blind SQL injection attacks are a well know and recognized form of code injection attack, but there are many other forms, some not so well documented or understood.
SQL盲注攻击是一种为人熟知的代码注入攻击形式,但是也有很多其他形式,有些尚未得到很好的记载和了解。
Newer modifications include Blind XPath injection, which reduces the knowledge required to mount the attack.
更新的修改中还包括暗藏xpath注入,它降低了安置攻击所需的知识。
The focus of this article is a specific type of code injection attack: the Blind XPath injection.
本文主要介绍代码注入攻击的一种特殊类型:XPath盲注。
An emerging threat, first outlined by Amit Klein in a paper in 2004, is the blind XPath injection attack (see Resources).
最近开始出现的一种威胁(最初由AmitKlein于2004年在一篇论文中概述)是XPath盲注攻击(请参阅参考资料)。
This attack functions almost exactly like the blind SQL injection attack but, unlike SQL injection attacks, few people know about XPath injection attacks or take precautions against them.
这种攻击的运作跟SQL盲注攻击几乎完全相似,与SQL注入攻击不同的是,几乎没什么人了解XPath盲注攻击或对其进行预防。
It's difficult to detect blindly the image rotation Angle in blind watermarking under geometry attack.
抗几何攻击的盲检测数字水印的难点是图像旋转角度的盲检测。
Liberal organizations committed to civil liberty will assist Washington in demonizing its next target for military attack while turning a blind eye to the war crimes of President Obama.
致力于公民自由的自由组织将协助华盛顿妖魔化下一个军事攻击目标而对奥巴马的战争罪行视而不见。
To raise the attack of defence, the technology of arm must be grasped and utilized in defence, at the same time in match blind use of the hand habits at will must also be avoided.
为了提高防守的攻击性,必须重视对防守时手臂技术的掌握和运用,同时在比赛中也必须避免盲目、随意用手的习惯。
Through the analysis of two proxy blind signature schemes, we want to prove that this two proxy blind signature schemes can not resist forgery attack and both have linkability.
对两个代理盲签方案及其安全性进行分析,证明了这两个方案不具有不可伪造性和不可链接性。
In this paper, a routing strategy that can adapt to the extension of network is proposed to attack the problem of blind routing in P2P search.
针对现有P 2 P检索的路由盲目性问题,论文给出了能够适应网络可扩展性的路由查询机制。
After analyzing a proxy blind signature scheme proposed by Huang et al., it was pointed out that the scheme was insecure against the original signer and signature receiver's forgery attack.
通过对黄辉等人提出的代理盲签名方案的分析,指出该方案不满足不可伪造性,原始签名者和签名接收者都可以伪造代理签名者的盲签名。
After analyzing a proxy blind signature scheme proposed by Huang et al., it was pointed out that the scheme was insecure against the original signer and signature receiver's forgery attack.
通过对黄辉等人提出的代理盲签名方案的分析,指出该方案不满足不可伪造性,原始签名者和签名接收者都可以伪造代理签名者的盲签名。
应用推荐