Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Web Application Vulnerability Prediction using Hybrid Program Analysis and Machine Learning
Submitted by BrandonB on Tue, 05/05/2015 - 9:55am
Data models
empirical study
HTML
input validation and sanitization
program analysis
security
security measures
Semisupervised learning
Servers
Software
Training
Vulnerability prediction
biblio
Automated Test Generation from Vulnerability Signatures
Submitted by BrandonB on Tue, 05/05/2015 - 9:54am
insecure Web applications
web services
vulnerability signatures
validation and sanitization
transition
testing
string analysis
static string analysis undecidability
state
security
scripting languages
program testing
program diagnostics
path coverage
Algorithm design and analysis
HTML
digital signatures
Databases
automatic vulnerability signature computation
automated test case generation
automata-based test generation
automata-based static string analysis techniques
automata theory
automata
authoring languages
attack string discovery
Approximation methods
biblio
Constructing secure web applications with proper data validations
Submitted by BrandonB on Tue, 05/05/2015 - 9:53am
Computational modeling
computer network security
critical web application vulnerabilities
Cross Site Scripting
data validations
HTML
injection
injections
internet
secure Web applications
security
validation
Vulnerability
XML
XSS
biblio
A Practical Experience on the Impact of Plugins in Web Security
Submitted by BrandonB on Tue, 05/05/2015 - 9:53am
security of data
web security
Web pages
web applications
Web application plugin vulnerabilities
vulnerabilities
testing
static code analysis tools
static analysis
SQL injection vulnerabilities
content management
security
program diagnostics
plugins
Manuals
internet
false positive rates
Databases
Cross Site Scripting
content management system
biblio
Automating Isolation and Least Privilege in Web Services
Submitted by BrandonB on Tue, 05/05/2015 - 9:53am
principle of least privilege
XSS attack
web services
web security
shared-memory-space application
Servers
security policy inference
security of data
security guarantee
security
sandboxed process
Runtime
query results
Prototypes
Browsers
Passe system
Libraries
isolation
HTML5 sandboxing techniques
Django web framework
Databases
database queries
data-flow relationship
cross-site scripting attack
control-flow relationship
client-facing applications
capabilities
biblio
Detection model for SQL injection attack: An approach for preventing a web application from the SQL injection attack
Submitted by BrandonB on Tue, 05/05/2015 - 9:52am
SQL injection
XSS
Web vulnerability detection model
Web pages
web applicationt
Web application vulnerabilities
Web application
vulneralbilities
Uniform resource locators
testing
system cracker
structured query language injection
SQL injection attack
authorisation
SQL
security
internet
hacking tutorials
hacking tools
Databases
CSRF
cross-site scripting
cross-site request forgery
Computer crime
Computational modeling
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Tue, 05/05/2015 - 9:51am
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
biblio
Preventing Client Side XSS with Rewrite Based Dynamic Information Flow
Submitted by BrandonB on Tue, 05/05/2015 - 9:49am
Semantics
JavaScript abstract syntax tree
JavaScript code
JSTFlow
online front-ends
performance overhead
rewrite based dynamic information flow
security
security of data
JavaScript
sensitive information leaks
Syntactics
taint engine
taint model
tainted information flow
web applications
XSS attacks
abstract intermediate representation
Java
internet
information security
information flow tracking framework
information flow analysis
fine-grained isolation
Engines
Data models
data flow analysis
cross-site scripting
code rewrite
client side XSS
Browsers
browser proxy
Abstracts
biblio
Security Testing Based on Attack Patterns
Submitted by BrandonB on Tue, 05/05/2015 - 9:48am
security
Unified modeling language
UML state machine
UML state charts
testing
SQL injection
software prototyping
Software
security testing
security of data
Adaptation models
program testing
model-based testing
internet
HTML
Databases
cross-site scripting
attack patterns
attack pattern
agile software development processes
biblio
Improved CSRFGuard for CSRF attacks defense on Java EE platform
Submitted by BrandonB on Tue, 05/05/2015 - 9:45am
Java
XSS
Welding
Servlet filter
security of data
security
script tags
JavaScript event delegation mechanism
Java EE platform
Java EE
Browsers
HTML
Event Delegation
custom response wrapper
CSRFGuard
CSRF attack defense
cross-site scripting
cross-site request forgery attack
cross-site request forgery
Computers
« first
‹ previous
…
422
423
424
425
426
427
428
429
430
…
next ›
last »