Cryptographic Hash Function Properties

  1. J. Ye, "Detecting command injection vulnerabilities in Linux-based embedded firmware," Computers & Security, vol. 146, 2024. Available online

  2. A. Stasinopoulos, C. Ntantogian, and C. Xenakis, "Commix: Detecting and exploiting command injection flaws," BlackHat Europe, 2015. Available online

  3. X. Wang, J. Zhai, and H. Yang, "Detecting command injection attacks in web applications based on novel deep learning methods," Scientific Reports, vol. 14, no. 25487, 2024. Available online

  4. A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996. Available online

  5. X. Wang and H. Yu, "How to Break MD5 and Other Hash Functions," in Advances in Cryptology – EUROCRYPT 2005, Lecture Notes in Computer Science, vol. 3494, pp. 19–35, 2005. Available online