OS command injection

  1. J. Ye, "Detecting command injection vulnerabilities in Linux-based embedded firmware," Computers & Security, vol. 146, 2024. Available online

  2. A. Stasinopoulos, C. Ntantogian, and C. Xenakis, "Commix: Detecting and exploiting command injection flaws," BlackHat Europe, 2015. Available online

  3. X. Wang, J. Zhai, and H. Yang, "Detecting command injection attacks in web applications based on novel deep learning methods," Scientific Reports, vol. 14, no. 25487, 2024. Available online