TOWARD BLACK-BOX DETECTION OF LOGIC FLAWS IN WEB APPLICATIONS

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (21. : 2014 : San Diego, Calif.) Network and Distributed System Security Symposium 2014 (NDSS '14)
1. Verfasser: Pellegrino, Giancarlo (VerfasserIn)
Weitere Verfasser: Balzarotti, Davide (VerfasserIn)
Pages:2014
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
GAINING CONTROL OF CELLULAR TRAFFIC ACCOUNTING BY SPURIOUS TCP RETRANSMISSION 2020 Go, Younghwan
CYBERPROBE: TOWARDS INTERNET-SCALE ACTIVE DETECTION OF MALICIOUS SERVERS 2020 Nappa, Antonio
SCREENMILKER: HOW TO MILK YOUR ANDROID SCREEN FOR SECRETS 2020 Lin, Chia-Chi
SIMULATION OF BUILT-IN PHP FEATURES FOR PRECISE STATIC CODE ANALYSIS 2020 Dahse, Johannes
ENHANCED CERTIFICATE TRANSPARENCY AND END-TO-END ENCRYPTED MAIL 2020 Ryan, Mark D.
ON SEMANTIC PATTERNS OF PASSWORDS AND THEIR SECURITY IMPACT 2020 Veras, Rafael
PRACTICAL DYNAMIC SEARCHABLE ENCRYPTION WITH SMALL LEAKAGE 2020 Stefanov, Emil
AUTHENTICATION USING PULSE-RESPONSE BIOMETRICS 2020 Rasmussen, Kasper B.
NAZCA: DETECTING MALWARE DISTRIBUTION IN LARGE-SCALE NETWORKS 2020 Invernizzi, Luca
EXECUTE THIS! ANALYZING UNSAFE AND MALICIOUS DYNAMIC CODE LOADING IN ANDROID APPLICATIONS 2020 Poeplau, Sebastian
EFFICIENT PRIVATE FILE RETRIEVAL BY COMBINING ORAM AND PIR 2020 Mayberry, Travis
A TRUSTED SAFETY VERIFIER FOR PROCESS CONTROLLER CODE 2020 McLaughlin, Stephen
ROPECKER: A GENERIC AND PRACTICAL APPROACH FOR DEFENDING AGAINST ROP ATTACKS 2020 Cheng, Yueqiang
SAFEDISPATCH: SECURING C++ VIRTUAL CALLS FROM MEMORY CORRUPTION ATTACKS 2020 Jang, Dongseok
BREAKING AND FIXING ORIGIN-BASED ACCESS CONTROL IN HYBRID WEB/MOBILE APPLICATION FRAMEWORKS 2020 Georgiev, Martin
TOWARD BLACK-BOX DETECTION OF LOGIC FLAWS IN WEB APPLICATIONS 2020 Pellegrino, Giancarlo
MACAROONS: COOKIES WITH CONTEXTUAL CAVEATS FOR DECENTRALIZED AUTHORIZATION IN THE CLOUD 2020 Birgisson, Arnar
PRIVACY THROUGH PSEUDONYMITY IN MOBILE TELEPHONY SYSTEMS 2020 Mancini, Loretta Ilaria
TWO-FACTOR AUTHENTICATION RESILIENT TO SERVER COMPROMISE USING MIX-BANDWIDTH DEVICES 2020 Shirvanian, Maliheh
LEVERAGING USB TO ESTABLISH HOST IDENTITY USING COMMODITY DEVICES 2020 Bates, Adam
Alle Artikel auflisten