BREAKING AND FIXING ORIGIN-BASED ACCESS CONTROL IN HYBRID WEB/MOBILE APPLICATION FRAMEWORKS

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (21. : 2014 : San Diego, Calif.) Network and Distributed System Security Symposium 2014 (NDSS '14)
1. Verfasser: Georgiev, Martin (VerfasserIn)
Weitere Verfasser: Jana, Suman (VerfasserIn), Shmatikov, Vitaly (VerfasserIn)
Pages:2014
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
GAINING CONTROL OF CELLULAR TRAFFIC ACCOUNTING BY SPURIOUS TCP RETRANSMISSION 2020 Go, Younghwan
CYBERPROBE: TOWARDS INTERNET-SCALE ACTIVE DETECTION OF MALICIOUS SERVERS 2020 Nappa, Antonio
SCREENMILKER: HOW TO MILK YOUR ANDROID SCREEN FOR SECRETS 2020 Lin, Chia-Chi
SIMULATION OF BUILT-IN PHP FEATURES FOR PRECISE STATIC CODE ANALYSIS 2020 Dahse, Johannes
ENHANCED CERTIFICATE TRANSPARENCY AND END-TO-END ENCRYPTED MAIL 2020 Ryan, Mark D.
ON SEMANTIC PATTERNS OF PASSWORDS AND THEIR SECURITY IMPACT 2020 Veras, Rafael
PRACTICAL DYNAMIC SEARCHABLE ENCRYPTION WITH SMALL LEAKAGE 2020 Stefanov, Emil
AUTHENTICATION USING PULSE-RESPONSE BIOMETRICS 2020 Rasmussen, Kasper B.
NAZCA: DETECTING MALWARE DISTRIBUTION IN LARGE-SCALE NETWORKS 2020 Invernizzi, Luca
EXECUTE THIS! ANALYZING UNSAFE AND MALICIOUS DYNAMIC CODE LOADING IN ANDROID APPLICATIONS 2020 Poeplau, Sebastian
EFFICIENT PRIVATE FILE RETRIEVAL BY COMBINING ORAM AND PIR 2020 Mayberry, Travis
ON THE MISMANAGEMENT AND MALICIOUSNESS OF NETWORKS 2020 Zhang, Jing
AMPLIFICATION HELL: REVISITING NETWORK PROTOCOLS FOR DDOS ABUSE 2020 Rossow, Christian
AVATAR: A FRAMEWORK TO SUPPORT DYNAMIC SECURITY ANALYSIS OF EMBEDDED SYSTEMS’ FIRMWARES 2020 Zaddach, Jonas
SMARTPHONES AS PRACTICAL AND SECURE LOCATION VERIFICATION TOKENS FOR PAYMENTS 2020 Marforio, Claudio
INSIDE JOB: UNDERSTANDING AND MITIGATING THE THREAT OF EXTERNAL DEVICE MIS-BINDING ON ANDROID 2020 Naveed, Muhammad
DSPIN: DETECTING AUTOMATICALLY SPUN CONTENT ON THE WEB 2020 Zhang, Qing
DETECTING LOGIC VULNERABILITIES IN E-COMMERCE APPLICATIONS 2020 Sun, Fangqi
THE SNIPER ATTACK: ANONYMOUSLY DEANONYMIZING AND DISABLING THE TOR NETWORK 2020 Jansen, Rob
FROM VERY WEAK TO VERY STRONG: ANALYZING PASSWORD-STRENGTH METERS 2020 Carnavalet, Xavier De Carné De
Alle Artikel auflisten