Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Web browsers
biblio
PhishFarm: A Scalable Framework for Measuring the Effectiveness of Evasion Techniques against Browser Phishing Blacklists
Submitted by grigby1 on Fri, 04/17/2020 - 9:44am
resilience
mobile computing
modern phishing websites
native blacklisting
Organizations
PhishFarm framework
Phishing
phishing attacks
phishing kits
pubcrawl
mobile browsers
Resiliency
security
security of data
unsolicited e-mail
Web Browser Security
Web browsers
Web sites
web-browser
diverse cloaking techniques
anti-phishing-ecosystem
blacklisting
browser blacklists
browser phishing blacklists
Browsers
Cloaking
composability
Compositionality
Computer crime
anti-phishing entities
Ecosystems
evasion techniques
HTTP request
Human behavior
Human Factors
internet
live phishing sites
Metrics
biblio
Detecting Exploit Websites Using Browser-based Predictive Analytics
Submitted by grigby1 on Fri, 04/17/2020 - 9:44am
Cybersecurity
Web Browser Security
Web-based computing
Web sites
Web browsers
web browser vulnerabilities
tool development
threat detection
Predictive Analytics
machine learning-powered predictive analytical model
human computer interaction
Data Analytics
browser-based predictive analytics
Compositionality
learning (artificial intelligence)
Metrics
Information analysis
Web browser
composability
cyberattacks
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
machine learning
biblio
Multilayer ROP Protection Via Microarchitectural Units Available in Commodity Hardware
Submitted by aekwall on Mon, 10/14/2019 - 9:20am
multilayer protection approach
Web browsers
security of data
Scalability
Runtime
ROP
Return-oriented Programming attacks
return oriented programming
Resiliency
RAS
pubcrawl
Program processors
Nonhomogeneous media
multilayer system
multilayer ROP protection
rop attacks
microarchitecture
microarchitectural units
lightweight security techniques
LBR
layers
Human Factors
Human behavior
Hardware
computer architecture
composability
commodity hardware
CFI
Benchmark testing
architecture
biblio
Hardening the Client-Side: A Guide to Enterprise-Level Hardening of Web Browsers
Submitted by K_Hooper on Wed, 05/09/2018 - 10:00am
security
least privilege tailored configurations
multiple web browsers
online front-ends
Organizations
Phishing
Plugin-based attacks
pubcrawl
Resiliency
Scalability
Secure Configuration
least privilege browser hardening
Security by Default
security of data
Servers
tools
un-trusted sites
Vegetation
web browser hardening
Web browsers
Web sites
Windows-based enterprise
enforced configuration
Browsers
business data processing
classic client desktop infrastructure
Computers
critical enterprise sites
critical trusted websites
cyber-compromise
Cybersecurity
data breaches
default configurations
attack avenues
enterprise-level hardening
enterprise-wide strategy
Google Chrome
Hardening
high-granularity tailored configurations
internet
Internet Explorer
JavaScript attacks
least privilege
biblio
TLS Connection Validation by Web Browsers: Why do Web Browsers Still Not Agree?
Submitted by K_Hooper on Wed, 12/20/2017 - 10:33am
security of data
X.509 certificates
X.509 Certificate
Web users
Web servers
Web browser validation process
Web Browser Security
Web browsers
Web browser behaviour
TLS connection validation
standards
Browsers
Resiliency
Public key
pubcrawl
Protocols
online front-ends
Metrics
IP networks
Human behavior
Certificate Validation
biblio
Security sandbox model for modern web environment
Submitted by K_Hooper on Wed, 12/20/2017 - 10:33am
nontrusted applications
Web Browser Security
Web browsers
security Sandbox model
security of data
security
sandbox
Resiliency
pubcrawl
privilege
online front-ends
browser
modern Web environment
Metrics
Kernel
internet
Human behavior
Hardware
filter
browser vulnerabilities
Browsers
biblio
Introduction to HTTP security headers and implementation of HTTP strict transport security (HSTS) header for HTTPS enforcing
Submitted by K_Hooper on Wed, 12/20/2017 - 10:33am
Metrics
Web sites
Web servers
Web browsers
Web Browser Security
transport protocols
SSL-TLS certificates
security policies
security of data
security
Resiliency
pubcrawl
Protocols
Browsers
IoT
Internet of Things
internet
hypermedia
Human behavior
HTTPS protocol
HTTP strict transport security header
HTTP protocol
HSTS
Computer crime
communication security
biblio
"A Logic of Programs with Interface-Confined Code"
Submitted by grigby1 on Thu, 02/23/2017 - 1:27pm
safety properties
Web browsers
untrusted code
trusted computing system
Trusted Computing
System M program logic
step-indexed model
standards
source code (software)
Semantics
security-critical systems
sandbox
adversary-supplied code
Safety
Radiation detectors
pubcrawl170106
program logic
Memoir design
interface-confined code
interface confinement
Instruction sets
hypervisors
Computational modeling
cognition
biblio
Browser's defenses against reflected cross-site scripting attacks
Submitted by BrandonB on Tue, 05/05/2015 - 9:44am
online Web applications
XSS-Me
XSS filters
XSS attack
Web browsers
Web based attack
Thyristors
security of data
security
Reflected XSS
reflected cross-site scripting attacks
attacker
online front-ends
Mozilla Firefox 27
JavaScript
Internet Explorer 11
Google Chrome 32
filter
exploit
bypass
Browsers
biblio
Performance analysis for extended TLS with mutual attestation for platform integrity assurance
Submitted by BrandonB on Fri, 05/01/2015 - 8:12am
Remote Attestation
Web-based application
web services
Web service security
Web servers
Web browsers
trustworthiness
trusted computing group
Trusted Computing
SSL-TLS protocol
security
Apache Web server
Protocols
principal component analysis
platform integrity assurance
mutual attestation mechanism
Mozilla Firefox browser
Internet connectivity
extended TLS
endpoint platforms
client-server environment
Browsers