-
1
-
-
77957587422
-
Towards a formal foundation of web security
-
D. Akhawe, A. Barth, P. E. Lam, J. Mitchell, and D. Song. Towards a Formal Foundation of Web Security. In Proceedings of the IEEE Computer Security Foundations Symposium, pages 290-304, 2010.
-
(2010)
Proceedings of the IEEE Computer Security Foundations Symposium
, pp. 290-304
-
-
Akhawe, D.1
Barth, A.2
Lam, P.E.3
Mitchell, J.4
Song, D.5
-
2
-
-
85049220056
-
Baggy bounds checking: An efficient and backwards-compatible defense against out-of-bounds errors
-
P. Akritidis, M. Costa, M. Castro, and S. Hand. Baggy Bounds Checking: An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors. In Proceedings of the USENIX Security Symposium, pages 51-66, 2009.
-
(2009)
Proceedings of the USENIX Security Symposium
, pp. 51-66
-
-
Akritidis, P.1
Costa, M.2
Castro, M.3
Hand, S.4
-
9
-
-
84862731005
-
Secure multi-execution through static program transformation
-
G. Barthe, J. M. Crespo, D. Devriese, F. Piessens, and E. Rivas. Secure Multi-Execution through Static Program Transformation. Proceedings of the International Conference on Formal Techniques for Distributed Systems, pages 186-202, 2012.
-
(2012)
Proceedings of the International Conference on Formal Techniques for Distributed Systems
, pp. 186-202
-
-
Barthe, G.1
Crespo, J.M.2
Devriese, D.3
Piessens, F.4
Rivas, E.5
-
12
-
-
74049102285
-
Reactive noninterference
-
A. Bohannon, B. C. Pierce, V. Sjöberg, S. Weirich, and S. Zdancewic. Reactive Noninterference. In Proceedings of the ACM Conference on Computer and Communications Security, pages 79-90, 2009.
-
(2009)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 79-90
-
-
Bohannon, A.1
Pierce, B.C.2
Sjöberg, V.3
Weirich, S.4
Zdancewic, S.5
-
13
-
-
60649120947
-
Preventing information leaks through shadow executions
-
R. Capizzi, A. Longo, V. Venkatakrishnan, and A. Sistla. Preventing Information Leaks through Shadow Executions. In Proceedings of the Annual Computer Security Applications Conference, pages 322-331, 2008.
-
(2008)
Proceedings of the Annual Computer Security Applications Conference
, pp. 322-331
-
-
Capizzi, R.1
Longo, A.2
Venkatakrishnan, V.3
Sistla, A.4
-
14
-
-
70450253203
-
Staged information flow for JavaScript
-
R. Chugh, J. A. Meister, R. Jhala, and S. Lerner. Staged Information Flow for JavaScript. ACM SIGPLAN Notices, 44(6):50-62, 2009.
-
(2009)
ACM SIGPLAN Notices
, vol.44
, Issue.6
, pp. 50-62
-
-
Chugh, R.1
Meister, J.A.2
Jhala, R.3
Lerner, S.4
-
15
-
-
84870643981
-
-
December
-
D. Crockford. Adsafe. http://www.adsafe.org/, December 2009.
-
(2009)
-
-
Crockford, D.1
-
19
-
-
84870638097
-
-
Fbjs
-
Facebook. Fbjs. http://developers.facebook.com/docs/fbjs/, 2011.
-
(2011)
-
-
-
22
-
-
84870632912
-
-
W3c: Html5. http://dev.w3.org/html5/spec/Overview.html.
-
W3c: Html5
-
-
-
23
-
-
78649998785
-
An empirical study of privacy-violating information flows in JavaScript web applications
-
D. Jang, R. Jhala, S. Lerner, and H. Shacham. An Empirical Study of Privacy-Violating Information Flows in JavaScript Web Applications. In Proceedings of the ACM Conference on Computer and Communications Security, pages 270-283, 2010.
-
(2010)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 270-283
-
-
Jang, D.1
Jhala, R.2
Lerner, S.3
Shacham, H.4
-
25
-
-
48349136934
-
On JavaScript Malware and related threats - Web page based attacks revisited
-
August
-
M. Johns. On JavaScript Malware and related threats - Web page based attacks revisited. Journal in Computer Virology, 4(3):161-178, August 2008.
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.3
, pp. 161-178
-
-
Johns, M.1
-
31
-
-
70349127409
-
-
January
-
M. S. Miller, M. Samuel, B. Laurie, I. Awad, and M. Stay. Caja: Safe active content in sanitized javascript. http://google-caja.googlecode.com/files/ caja-spec-2008-01-15.pdf, January 2008.
-
(2008)
Caja: Safe Active Content in Sanitized Javascript
-
-
Miller, M.S.1
Samuel, M.2
Laurie, B.3
Awad, I.4
Stay, M.5
-
32
-
-
84869428407
-
You are what you include: Large-scale evaluation of remote JavaScript inclusions
-
N. Nikiforakis, L. Invernizzi, A. Kapravelos, S. Van Acker, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna. You Are What You Include: Large-scale Evaluation of Remote JavaScript Inclusions. In Proceedings of the ACM Conference on Computer and Communications Security, 2012.
-
(2012)
Proceedings of the ACM Conference on Computer and Communications Security
-
-
Nikiforakis, N.1
Invernizzi, L.2
Kapravelos, A.3
Van Acker, S.4
Joosen, W.5
Kruegel, C.6
Piessens, F.7
Vigna, G.8
-
33
-
-
79551556871
-
SessionShield: Lightweight protection against session hijacking
-
N. Nikiforakis, W. Meert, Y. Younan, M. Johns, and W. Joosen. SessionShield: Lightweight protection against session hijacking. In Proceedings of the International Symposium on Engineering Secure Software and Systems, pages 87-100, 2011.
-
(2011)
Proceedings of the International Symposium on Engineering Secure Software and Systems
, pp. 87-100
-
-
Nikiforakis, N.1
Meert, W.2
Younan, Y.3
Johns, M.4
Joosen, W.5
-
34
-
-
80053650188
-
All your iFRAMEs point to us
-
N. Provos, P. Mavrommatis, M. A. Rajab, and F. Monrose. All Your iFRAMEs Point to Us. In Proceedings of the USENIX Security Symposium, pages 1-15, 2008.
-
(2008)
Proceedings of the USENIX Security Symposium
, pp. 1-15
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.A.3
Monrose, F.4
-
35
-
-
85080711655
-
The ghost in the browser analysis of web-based malware
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The Ghost In The Browser Analysis of Web-based Malware. In Proceedings of the USENIX Workshop on Hot Topics in Understanding Botnets, 2007.
-
(2007)
Proceedings of the USENIX Workshop on Hot Topics in Understanding Botnets
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
39
-
-
77955224128
-
On the incoherencies in web browser access control policies
-
K. Singh, A. Moshchuk, H. J. Wang, and W. Lee. On the Incoherencies in Web Browser Access Control Policies. In Proceedings of the IEEE Symposium on Security and Privacy, pages 463-478, 2010.
-
(2010)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 463-478
-
-
Singh, K.1
Moshchuk, A.2
Wang, H.J.3
Lee, W.4
-
41
-
-
84887309913
-
Cross site scripting prevention with dynamic data tainting and static analysis
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Krügel, and G. Vigna. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In Proceedings of the Annual Network & Distributed System Security Symposium, 2007.
-
(2007)
Proceedings of the Annual Network & Distributed System Security Symposium
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Krügel, C.5
Vigna, G.6
-
43
-
-
85038810709
-
Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
-
W. Xu, S. Bhatkar, and R. Sekar. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks. In Proceedings of the USENIX Security Symposium, pages 121-136, 2006.
-
(2006)
Proceedings of the USENIX Security Symposium
, pp. 121-136
-
-
Xu, W.1
Bhatkar, S.2
Sekar, R.3
-
44
-
-
70349152918
-
Privacy-preserving browser-side scripting with BFlow
-
ACM
-
A. Yip, N. Narula, M. Krohn, and R. Morris. Privacy-preserving browser-side scripting with BFlow. In Proceedings of the ACM European Conference on Computer Systems, pages 233-246. ACM, 2009.
-
(2009)
Proceedings of the ACM European Conference on Computer Systems
, pp. 233-246
-
-
Yip, A.1
Narula, N.2
Krohn, M.3
Morris, R.4
-
45
-
-
84863452455
-
Runtime countermeasures for code injection attacks against C and C++ programs
-
Y. Younan, W. Joosen, and F. Piessens. Runtime countermeasures for code injection attacks against C and C++ programs. ACM Computing Surveys, 44(3):17:1-17:28, 2012.
-
(2012)
ACM Computing Surveys
, vol.44
, Issue.3
, pp. 171-1728
-
-
Younan, Y.1
Joosen, W.2
Piessens, F.3
-
46
-
-
77954495640
-
PAriCheck: An efficient pointer arithmetic checker for C programs
-
Y. Younan, P. Philippaerts, L. Cavallaro, R. Sekar, F. Piessens, and W. Joosen. PAriCheck: An Efficient Pointer Arithmetic Checker for C Programs. In Proceedings of the ACM Symposium on Information, Computer and Communications Security, pages 145-156, 2010.
-
(2010)
Proceedings of the ACM Symposium on Information, Computer and Communications Security
, pp. 145-156
-
-
Younan, Y.1
Philippaerts, P.2
Cavallaro, L.3
Sekar, R.4
Piessens, F.5
Joosen, W.6
|