-
3
-
-
77954485076
-
A solution for the automated detection of clickjacking attacks
-
M. Balduzzi, M. Egele, E. Kirda, D. Balzarotti, and C. Kruegel. A solution for the automated detection of clickjacking attacks. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010.
-
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010
-
-
Balduzzi, M.1
Egele, M.2
Kirda, E.3
Balzarotti, D.4
Kruegel, C.5
-
4
-
-
85166275153
-
Protecting browsers from extension vulnerabilities
-
A. Barth, A. P. Felt, P. Saxena, and A. Boodman. Protecting browsers from extension vulnerabilities. In Proceedings of the 17th Annual Network and Distributed System Security Symposium, NDSS '10, 2010.
-
Proceedings of the 17th Annual Network and Distributed System Security Symposium, NDSS '10, 2010
-
-
Barth, A.1
Felt, A.P.2
Saxena, P.3
Boodman, A.4
-
6
-
-
84889073581
-
-
Bitbucket. https://bitbucket.org/.
-
-
-
-
7
-
-
85091966368
-
Wedge: Splitting applications into reduced-privilege compartments
-
A. Bittau, P. Marchenko, M. Handley, and B. Karp. Wedge: splitting applications into reduced-privilege compartments. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI '08, 2008.
-
Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, NSDI '08, 2008
-
-
Bittau, A.1
Marchenko, P.2
Handley, M.3
Karp, B.4
-
8
-
-
84893328361
-
Neuroscience meets cryptography: Designing crypto primitives secure against rubber hose attacks
-
H. Bojinov, D. Sanchez, P. Reber, D. Boneh, and P. Lincoln. Neuroscience meets cryptography: designing crypto primitives secure against rubber hose attacks. In Proceedings of the 21st USENIX Security Symposium, 2012.
-
Proceedings of the 21st USENIX Security Symposium, 2012
-
-
Bojinov, H.1
Sanchez, D.2
Reber, P.3
Boneh, D.4
Lincoln, P.5
-
13
-
-
84889022933
-
-
cairo-glyph-t
-
CairoGraphics. cairo-glyph-t. http://cairographics.org/manual/cairo-text. html#cairo-glyph-t.
-
-
-
-
15
-
-
70349141059
-
On the limits of information flow techniques for malware analysis and containment
-
L. Cavallaro, P. Saxena, and R. Sekar. On the limits of information flow techniques for malware analysis and containment. In Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '08, 2008.
-
Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '08, 2008
-
-
Cavallaro, L.1
Saxena, P.2
Sekar, R.3
-
16
-
-
80755144024
-
App isolation: Get the security of multiple browsers with just one
-
E. Y. Chen, J. Bau, C. Reis, A. Barth, and C. Jackson. App isolation: get the security of multiple browsers with just one. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, 2011.
-
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, 2011
-
-
Chen, E.Y.1
Bau, J.2
Reis, C.3
Barth, A.4
Jackson, C.5
-
18
-
-
77955197190
-
Side-channel leaks in web applications: A reality today, a challenge tomorrow
-
S. Chen, R. Wang, X. Wang, and K. Zhang. Side-channel leaks in web applications: A reality today, a challenge tomorrow. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, 2010.
-
Proceedings of the 2010 IEEE Symposium on Security and Privacy, 2010
-
-
Chen, S.1
Wang, R.2
Wang, X.3
Zhang, K.4
-
23
-
-
84889006399
-
-
A. R. Developers. Ajaxim rpg
-
A. R. Developers. Ajaxim rpg. http://ajaximrpg.sourceforge.net/.
-
-
-
-
24
-
-
84889002357
-
A quantitative evaluation of privilege separation in web browser designs
-
X. Dong, H. Hong, Z. Liang, and P. Saxena. A quantitative evaluation of privilege separation in web browser designs. In Proceedings of the 18th European Conference on Research in Computer Security, ESORICS '13, 2013.
-
Proceedings of the 18th European Conference on Research in Computer Security, ESORICS '13, 2013
-
-
Dong, X.1
Hong, H.2
Liang, Z.3
Saxena, P.4
-
25
-
-
84855642265
-
Adsentry: Comprehensive and flexible confinement of javascript-based advertisements
-
X. Dong, M. Tran, Z. Liang, and X. Jiang. Adsentry: comprehensive and flexible confinement of javascript-based advertisements. In Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC '11, 2011.
-
Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC '11, 2011
-
-
Dong, X.1
Tran, M.2
Liang, Z.3
Jiang, X.4
-
30
-
-
84888997748
-
-
W. Foundation
-
W. Foundation. Wordpress. http://wordpress.org/.
-
-
-
-
31
-
-
77952338717
-
A framework for detection and measurement of phishing attacks
-
S. Garera, N. Provos, M. Chew, and A. D. Rubin. A framework for detection and measurement of phishing attacks. In Proceedings of the 2007 ACM Workshop on Recurring Malcode, WORM '07, 2007.
-
Proceedings of the 2007 ACM Workshop on Recurring Malcode, WORM '07, 2007
-
-
Garera, S.1
Provos, N.2
Chew, M.3
Rubin, A.D.4
-
32
-
-
84889048661
-
-
Github. https://github.com.
-
-
-
-
35
-
-
77954942438
-
An architecture for enforcing end-to-end access control over web applications
-
B. Hicks, S. Rueda, D. King, T. Moyer, J. Schiffman, Y. Sreenivasan, P. McDaniel, and T. Jaeger. An architecture for enforcing end-to-end access control over web applications. In Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, SACMAT '10, 2010.
-
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, SACMAT '10, 2010
-
-
Hicks, B.1
Rueda, S.2
King, D.3
Moyer, T.4
Schiffman, J.5
Sreenivasan, Y.6
McDaniel, P.7
Jaeger, T.8
-
36
-
-
84940382117
-
Clickjacking: Attacks and defenses
-
L.-S. Huang, A. Moshchuk, H. J. Wang, S. Schechter, and C. Jackson. Clickjacking: attacks and defenses. In Proceedings of the 21st USENIX Security Symposium, 2012.
-
Proceedings of the 21st USENIX Security Symposium, 2012
-
-
Huang, L.-S.1
Moshchuk, A.2
Wang, H.J.3
Schechter, S.4
Jackson, C.5
-
39
-
-
38549121705
-
An evaluation of extended validation and picture-in-picture phishing attacks
-
C. Jackson, D. R. Simon, D. S. Tan, and A. Barth. An evaluation of extended validation and picture-in-picture phishing attacks. In Proceedings of the 11th International Conference on Financial Cryptography and 1st International Conference on Usable Security, FC'07/USEC'07, 2007.
-
Proceedings of the 11th International Conference on Financial Cryptography and 1st International Conference on Usable Security, FC'07/USEC'07, 2007
-
-
Jackson, C.1
Simon, D.R.2
Tan, D.S.3
Barth, A.4
-
40
-
-
77955860750
-
Escudo: A fine-grained protection model for web browsers
-
K. Jayaraman, W. Du, B. Rajagopalan, and S. J. Chapin. Escudo: A fine-grained protection model for web browsers. In Proceedings of the 30th International Conference on Distributed Computing Systems, ICDCS '10, 2010.
-
Proceedings of the 30th International Conference on Distributed Computing Systems, ICDCS '10, 2010
-
-
Jayaraman, K.1
Du, W.2
Rajagopalan, B.3
Chapin, S.J.4
-
45
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS-IX, 2000.
-
Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS-IX, 2000
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
48
-
-
84888986199
-
Do you know where your data are?: Secure data capsules for deployable data protection
-
P. Maniatis, D. Akhawe, K. Fall, E. Shi, S. McCamant, and D. Song. Do you know where your data are?: secure data capsules for deployable data protection. In Proceedings of the 13th Workshop on Hot Topics in Operating Systems, HotOS-XIII, 2011.
-
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, HotOS-XIII, 2011
-
-
Maniatis, P.1
Akhawe, D.2
Fall, K.3
Shi, E.4
McCamant, S.5
Song, D.6
-
51
-
-
84889011578
-
-
Mozilla. Firefox os
-
Mozilla. Firefox os. https://developer.mozilla.org/en-US/docs/Mozilla/ Firefox-OS.
-
-
-
-
54
-
-
80051875813
-
Towards fine-grained access control in javascript contexts
-
K. Patil, X. Dong, X. Li, Z. Liang, and X. Jiang. Towards fine-grained access control in javascript contexts. In Proceedings of the 31st International Conference on Distributed Computing Systems, ICDCS '11, 2011.
-
Proceedings of the 31st International Conference on Distributed Computing Systems, ICDCS '11, 2011
-
-
Patil, K.1
Dong, X.2
Li, X.3
Liang, Z.4
Jiang, X.5
-
55
-
-
84889038717
-
-
T. C. Projects. Chromium os
-
T. C. Projects. Chromium os. http://www.chromium.org/chromium-os.
-
-
-
-
56
-
-
84889073060
-
-
T. C. Projects. Linuxsandboxing
-
T. C. Projects. Linuxsandboxing. https://code.google.com/p/chromium/wiki/ LinuxSandboxing#The-seccomp-bpf-sandbox.
-
-
-
-
57
-
-
84888987548
-
-
T. C. Projects. Sandbox
-
T. C. Projects. Sandbox. http://www.chromium.org/developers/design- documents/sandbox.
-
-
-
-
58
-
-
84874840847
-
User-driven access control: Rethinking permission granting in modern operating systems
-
F. Roesner, T. Kohno, A. Moshchuk, B. Parno, H. J. Wang, and C. Cowan. User-driven access control: Rethinking permission granting in modern operating systems. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, 2012.
-
Proceedings of the 2012 IEEE Symposium on Security and Privacy, 2012
-
-
Roesner, F.1
Kohno, T.2
Moshchuk, A.3
Parno, B.4
Wang, H.J.5
Cowan, C.6
-
62
-
-
77955220343
-
A symbolic execution framework for javascript
-
P. Saxena, D. Akhawe, S. Hanna, F. Mao, S. McCamant, and D. Song. A symbolic execution framework for javascript. In Proceedings of the 2010 IEEE Symposium on Security and Privacy, 2010.
-
Proceedings of the 2010 IEEE Symposium on Security and Privacy, 2010
-
-
Saxena, P.1
Akhawe, D.2
Hanna, S.3
Mao, F.4
McCamant, S.5
Song, D.6
-
64
-
-
84889034552
-
Cleanos: Limiting mobile data exposure with idle eviction
-
Y. Tang, P. Ames, S. Bhamidipati, A. Bijlani, R. Geambasu, and N. Sarda. Cleanos: limiting mobile data exposure with idle eviction. In Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, OSDI '12, 2012.
-
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, OSDI '12, 2012
-
-
Tang, Y.1
Ames, P.2
Bhamidipati, S.3
Bijlani, A.4
Geambasu, R.5
Sarda, N.6
-
65
-
-
84889055876
-
-
T. R. Team. Roundcube
-
T. R. Team. Roundcube. http://www.roundcube.net/.
-
-
-
-
66
-
-
84887309913
-
Cross-site scripting prevention with dynamic data tainting and static analysis
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross-site scripting prevention with dynamic data tainting and static analysis. In Proceedings of the 14th Annual Network and Distributed System Security Symposium, NDSS '07, 2007.
-
Proceedings of the 14th Annual Network and Distributed System Security Symposium, NDSS '07, 2007
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
68
-
-
0027836576
-
Efficient software-based fault isolation
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient software-based fault isolation. In Proceedings of the 14th ACM Symposium on Operating Systems Principles, SOSP '93, 1993.
-
Proceedings of the 14th ACM Symposium on Operating Systems Principles, SOSP '93, 1993
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
69
-
-
77954608267
-
The multi-principal os construction of the gazelle web browser
-
H. J. Wang, C. Grier, A. Moshchuk, S. T. King, P. Choudhury, and H. Venter. The multi-principal os construction of the gazelle web browser. In Proceedings of the 18th USENIX Security Symposium, 2009.
-
Proceedings of the 18th USENIX Security Symposium, 2009
-
-
Wang, H.J.1
Grier, C.2
Moshchuk, A.3
King, S.T.4
Choudhury, P.5
Venter, H.6
|