Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
online front-ends
biblio
The Creation Process of a Secure and Private Mobile Web Browser with no Ads and no Popups
Submitted by grigby1 on Fri, 04/17/2020 - 10:44am
Metrics
Web Browser Security
World Wide Web
Web sites
secure mode
private mode
mobile Web browser
Mobile Applications
hypermedia markup languages
HTML5 Web page
creation process
Browsers
Compositionality
security of data
online front-ends
mobile computing
composability
web services
internet
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
STEROIDS for DOPed Applications: A Compiler for Automated Data-Oriented Programming
Submitted by grigby1 on Mon, 03/23/2020 - 3:58pm
ROP chain
Just-in-Time
just-in-time gadget search
low-level DOP data structures
Manuals
memory corruption vulnerabilities
object-oriented programming
online front-ends
Payloads
pointer chain
program compilers
program debugging
relocate gadget addresses
JIT-ROP attack
scripting engine
Slang
software reusability
Steroids
STEROIDS compiles
Turing machines
Turing-complete computations
vastly different vulnerabilities
vulnerability-independent
Web browser
wide-spread adoption
rop attacks
automated data-oriented programming
Engines
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
Scalability
Prototypes
composability
Program processors
programming
64-bit applications
security of data
code pointers
code-reuse attacks
code-reuse chain
code-reuse techniques
compiler
conventional code-injection
data structures
data-oriented programming
DOP exploits
DOPed applications
exploitation
high-level language SLANG
biblio
Research and Implementation of Cross-site Scripting Defense Method Based on Moving Target Defense Technology
Submitted by aekwall on Mon, 12/16/2019 - 2:17pm
moving target defense technology
XSS defense method
Web pages
Web application
security of data
security check function
Scalability
resilience
Reactive power
random processes
random attribute
pubcrawl
programmable logic arrays
online front-ends
MTD
authoring languages
moving target defense
JavaScript engine
JavaScript code
Java
internet
hypertext markup language
hypermedia markup languages
Human behavior
HTML
Engines
cross-site scripting attack
cross-site scripting
Cross Site Scripting
Browsers
biblio
Reducing attack surface corresponding to Type 1 cross-site scripting attacks using secure development life cycle practices
Submitted by aekwall on Mon, 12/16/2019 - 2:17pm
malware
XSS
Web users
Web sites
Web server
Web response
Web request
Web based application vulnerabilities
Uniform resource locators
secure development life cycle practices
Scalability
resilience
pubcrawl
online front-ends
nonpersistent cross-site scripting attack
non-persistent
attack
malicious links
malicious functions
Libraries
legitimate Web site
Internet based application
internet
Human behavior
encoding
cross-site scripting
Cross Site Scripting
clients Web browser
client-side code injection attack
Browsers
attack surface
biblio
Constructing Browser Fingerprint Tracking Chain Based on LSTM Model
Submitted by grigby1 on Fri, 04/05/2019 - 10:27am
LSTM
training set
track Web attackers
stateless tracking technique
Stability analysis
LSTM model
input feature vector
browser fingerprint tracking chain
browser fingerprint evolution
browser fingerprint
recurrent neural nets
Time series analysis
time series
Resiliency
security of data
Compositionality
Browser Security
tracking
Fingerprint recognition
online front-ends
Recurrent neural networks
computer architecture
Browsers
Training
Metrics
Human behavior
pubcrawl
resilience
biblio
Tor Browser Forensics in Exploring Invisible Evidence
Submitted by grigby1 on Fri, 04/05/2019 - 10:27am
Resiliency
Tor browser forensics
Relays
perpetrators
onion routing
onion router
invisible evidence
Internet crimes
information security offenses
information security incidents
incognito
Facebook
endeavors
digital evidence
DH-HEMTs
internet
Tor
Digital Forensics
Compositionality
Browser Security
online front-ends
Computer crime
Forensics
Cryptography
Browsers
Metrics
Human behavior
pubcrawl
resilience
tools
biblio
FP -TESTER : Automated Testing of Browser Fingerprint Resilience
Submitted by grigby1 on Fri, 04/05/2019 - 10:27am
Browser Security
testing toolkit
software tools
privacy leaks
FP-TESTER
browser vendors
browser tracking
browser fingerprint resilience
Automated Testing
Resiliency
Statistics
Sociology
program testing
Compositionality
privacy
Fingerprint recognition
Browser Fingerprinting
online front-ends
Entropy
Browsers
Metrics
Human behavior
pubcrawl
resilience
testing
security of data
data privacy
internet
biblio
FP-STALKER: Tracking Browser Fingerprint Evolutions
Submitted by grigby1 on Fri, 04/05/2019 - 10:26am
online front-ends
target tracking
Portable document format
FP-STALKER approach
browser instances
Resiliency
Compositionality
Browser Security
Fingerprint recognition
Browser Fingerprinting
privacy
microsoft windows
Browsers
learning (artificial intelligence)
Metrics
Human behavior
pubcrawl
resilience
security
data privacy
biblio
SoundAuth: Secure Zero-Effort Two-Factor Authentication Based on Audio Signals
Submitted by grigby1 on Fri, 02/08/2019 - 4:34pm
password
zero-effort two-factor authentication
zero-effort 2FA mechanism
user-friendliness
user experience
two factor authentication
time synchronization
Support vector machines
support vector machine
SoundAuth
smart phones
smart phone
Servers
pubcrawl
ambient audio signals
online front-ends
machine learning
learning (artificial intelligence)
Human Factors
Human behavior
co-presence detection
challenge-response protocol
Browsers
browser
authorisation
authentication
audio signals
ambient sound
biblio
Malicious browser extensions: A growing threat: A case study on Google Chrome: Ongoing work in progress
Submitted by grigby1 on Wed, 01/16/2019 - 2:32pm
Servers
online front-ends
party developers
payment frauds
Phishing
popular browser
pubcrawl
Resiliency
security of data
Metrics
spying
traditional functionalities
Uniform resource locators
unsolicited e-mail
Videos
Web Browser Security
Web pages
affiliate fraud
malicious browser extensions
malicious browser extension
internet
Human behavior
Google Chrome
fraud
Electronic mail
current browsers
Computer crime
Compositionality
Browsers
browser extension platform
browser extension
attacks
attack possibilities
« first
‹ previous
1
2
3
4
5
next ›
last »