-
1
-
-
33751038485
-
The final nail in WEP's coffin
-
Oakland, CA
-
Andrea Bittau, Mark Handley, Joshua Lackey, "The Final Nail in WEP's Coffin, " the 2006 IEEE Symposium on Security and Privacy, Oakland, CA.
-
The 2006 IEEE Symposium on Security and Privacy
-
-
Bittau, A.1
Handley, M.2
Lackey, J.3
-
3
-
-
34548780878
-
A systematic approach to uncover security flaws in GUI logic
-
Oakland, California, May
-
Shuo Chen, Jose Meseguer, Ralf Sasse, Helen J. Wang, Yi-Min Wang, "A Systematic Approach to Uncover Security Flaws in GUI Logic, " in IEEE Symposium on Security and Privacy, Oakland, California, May 2007.
-
(2007)
IEEE Symposium on Security and Privacy
-
-
Chen, S.1
Meseguer, J.2
Sasse, R.3
Wang, H.J.4
Wang, Y.-M.5
-
4
-
-
77952394606
-
An analysis of browser domain-isolation bugs and a light-weight transparent defense mechanism
-
Alexandria, VA, Oct-Nov.
-
Shuo Chen, David Ross, Yi-Min Wang, "An Analysis of Browser Domain-Isolation Bugs and A Light-Weight Transparent Defense Mechanism, " in ACM Conference on Computer and Communications Security, Alexandria, VA, Oct-Nov 2007.
-
(2007)
ACM Conference on Computer and Communications Security
-
-
Chen, S.1
Ross, D.2
Wang, Y.-M.3
-
5
-
-
70449693343
-
-
Cookie Property
-
Cookie Property. MSDN. http://msdn2.microsoft.com/enus/library/ms533693. aspx.
-
MSDN
-
-
-
8
-
-
77952370957
-
Dynamic pharming attacks and locked same-origin policies for web browsers
-
November
-
Chris Karlof, Umesh Shankar, J.D. Tygar, and David Wagner, "Dynamic Pharming Attacks and Locked Same-origin Policies for Web Browsers, " the Fourteenth ACM Conference on Computer and Communications Security (CCS 2007), November 2007.
-
(2007)
The Fourteenth ACM Conference on Computer and Communications Security (CCS 2007)
-
-
Karlof, C.1
Shankar, U.2
Tygar, J.D.3
Wagner, D.4
-
9
-
-
84923564816
-
Finding security vulnerabilities in java applications with static analysis
-
Baltimore, Maryland, August
-
Benjamin Livshits and Monica S. Lam. "Finding Security Vulnerabilities in Java Applications with Static Analysis, " in Proc. Usenix Security Symposium, Baltimore, Maryland, August 2005.
-
(2005)
Proc. Usenix Security Symposium
-
-
Livshits, B.1
Lam., M.S.2
-
14
-
-
34548786769
-
The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies
-
Oakland, CA. May 20-23
-
Stuart E. Schechter, Rachna Dhamija, Andy Ozment, and Ian Fischer, "The Emperor's New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies, " in 2007 IEEE Symposium on Security and Privacy, Oakland, CA. May 20-23, 2007.
-
(2007)
2007 IEEE Symposium on Security and Privacy
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
15
-
-
70350698232
-
-
Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger. "MD5 considered harmful today - Creating a rogue CA certificate, " http://www.win.tue.nl/hashclash/rogue- ca/#sec71.
-
MD5 Considered Harmful Today - Creating a Rogue CA Certificate
-
-
Sotirov, A.1
Stevens, M.2
Appelbaum, J.3
Lenstra, A.4
Molnar, D.5
Osvik, D.A.6
De Weger, B.7
-
19
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
Vancouver, BC, Canada, July
-
Wei Xu, Sandeep Bhatkar and R. Sekar. "Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks, " in Proc. the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 2006.
-
(2006)
Proc. the 15th USENIX Security Symposium
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
-
21
-
-
70449667170
-
-
MSDN Online. WinHTTP AutoProxy Support. http://msdn.microsoft.com/en-us/ library/aa384240.aspx.
-
WinHTTP AutoProxy Support
-
-
-
22
-
-
70449691758
-
-
http://www.hw.ac.uk/uics/Help-FAQs/WiFi-FAQs.html http://homepage.eircom. net/~acsi/encs08.htm http://www.ucd.ie/mcri/resources/IP-logistics-students.pdf http://www.vistagate.com/Demo/Administration/Help.htm http://www.grh.org/ patWireless.html
-
Internet access configuration instructions for some conferences, hotels, hospitals and airports that require proxies. http://homepage.eircom.net/~acsi/ encs08.htm http://www.hw.ac.uk/uics/Help-FAQs/WiFi-FAQs.html http://homepage.eircom.net/~acsi/encs08.htm http://www.ucd.ie/mcri/resources/IP- logistics-students.pdf http://www.vistagate.com/Demo/Administration/Help.htm http://www.grh.org/patWireless.html.
-
Internet Access Configuration Instructions for Some Conferences, Hotels, Hospitals and Airports that Require Proxies
-
-
-
23
-
-
70449664557
-
-
http://www.lib.berkeley.edu/Help/proxy-setup-ie5-7-dialup.html http://meded.ucsd.edu/edcom/tech-support/remote-access/web-prox y/internet-explorer/http://physics.ucsd.edu/~sps/html/resources/articles/ sciamsetup.html http://www.lib.ucdavis.edu/ul/services/connect/proxy/step1/ iewindo wslong.php
-
Internet access configuration instructions for some university departments and libraries that require proxies. http://groups.haas.berkeley.edu/ hcs/howdoi/AirBearsXP.pdf http://www.lib.berkeley.edu/Help/proxy-setup-ie5-7- dialup.html http://meded.ucsd.edu/edcom/tech-support/remote-access/web-prox y/internet-explorer/http://physics.ucsd.edu/~sps/html/resources/articles/ sciamsetup.html http://www.lib.ucdavis.edu/ul/services/connect/proxy/step1/ iewindo wslong.php.
-
Internet Access Configuration Instructions for Some University Departments and Libraries that Require Proxies
-
-
|