메뉴 건너뛰기




Volumn 8604, Issue , 2014, Pages 88-123

Defensive javascript building and verifying secure web components

Author keywords

[No Author keywords available]

Indexed keywords

WEBSITES; SECURITY SYSTEMS;

EID: 84927592750     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-10082-1_4     Document Type: Article
Times cited : (7)

References (28)
  • 1
    • 85026581986 scopus 로고    scopus 로고
    • Helios: Web-based open-audit voting
    • Adida, B.: Helios: Web-based open-audit voting. In: USENIX Security Symposium, pp. 335-348 (2008)
    • (2008) USENIX Security Symposium , pp. 335-348
    • Adida, B.1
  • 2
    • 85084160402 scopus 로고    scopus 로고
    • Rootkits for JavaScript environments
    • Adida, B., Barth, A., Jackson, C.: Rootkits for JavaScript environments. In: WOOT (2009)
    • (2009) WOOT
    • Adida, B.1    Barth, A.2    Jackson, C.3
  • 5
    • 84859355144 scopus 로고    scopus 로고
    • Privacy supporting cloud computing: ConfiChair, a case study
    • In: Degano, P., Guttman, J.D. (eds.), Springer, Heidelberg
    • Arapinis, M., Bursuc, S., Ryan, M.: Privacy supporting cloud computing: ConfiChair, a case study. In: Degano, P., Guttman, J.D. (eds.) POST 2012. LNCS, vol. 7215, pp. 89-108. Springer, Heidelberg (2012)
    • (2012) POST 2012. LNCS , vol.7215 , pp. 89-108
    • Arapinis, M.1    Bursuc, S.2    Ryan, M.3
  • 7
    • 84874442652 scopus 로고    scopus 로고
    • Keys to the cloud: Formal analysis and concrete attacks on encrypted web storage
    • In: Basin, D., Mitchell, J.C. (eds.), Springer, Heidelberg
    • Bansal, C., Bhargavan, K., Delignat-Lavaud, A., Maffeis, S.: Keys to the cloud: Formal analysis and concrete attacks on encrypted web storage. In: Basin, D., Mitchell, J.C. (eds.) POST 2013. LNCS, vol. 7796, pp. 126-146. Springer, Heidelberg (2013)
    • (2013) POST 2013. LNCS , vol.7796 , pp. 126-146
    • Bansal, C.1    Bhargavan, K.2    Delignat-Lavaud, A.3    Maffeis, S.4
  • 8
    • 84866927100 scopus 로고    scopus 로고
    • Discovering concrete attacks on website authorization by formal analysis
    • Bansal, C., Bhargavan, K., Maffeis, S.: Discovering concrete attacks on website authorization by formal analysis. In: CSF, pp. 247-262 (2012)
    • (2012) CSF , pp. 247-262
    • Bansal, C.1    Bhargavan, K.2    Maffeis, S.3
  • 10
    • 85084162607 scopus 로고    scopus 로고
    • Web-based attacks on host-proof encrypted storage
    • Bhargavan, K., Delignat-Lavaud, A.: Web-based attacks on host-proof encrypted storage. In: WOOT (2012)
    • (2012) WOOT
    • Bhargavan, K.1    Delignat-Lavaud, A.2
  • 11
    • 33947683919 scopus 로고    scopus 로고
    • Verified interoperable implementations of security protocols
    • Bhargavan, K., Fournet, C., Gordon, A.D., Tse, S.: Verified interoperable implementations of security protocols. In: CSFW, pp. 139-152 (2006)
    • (2006) CSFW , pp. 139-152
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3    Tse, S.4
  • 13
    • 68249091950 scopus 로고    scopus 로고
    • Automatic verification of correspondences for security protocols
    • Blanchet, B.: Automatic verification of correspondences for security protocols. Journal of Computer Security 17(4), 363-434 (2009)
    • (2009) Journal of Computer Security , vol.17 , Issue.4 , pp. 363-434
    • Blanchet, B.1
  • 16
    • 85066366136 scopus 로고    scopus 로고
    • ECMA International: ECMAScript language specification
    • 3rd edn
    • ECMA International: ECMAScript language specification. Stardard ECMA-262, 3rd edn. (1999)
    • (1999) Stardard ECMA-262
  • 19
    • 84895539842 scopus 로고    scopus 로고
    • The OAuth 2.0 authorization framework
    • Hardt, D.: The OAuth 2.0 authorization framework. IETF RFC 6749 (2012)
    • (2012) IETF RFC
    • Hardt, D.1
  • 20
    • 84893092387 scopus 로고    scopus 로고
    • HTTP Strict Transport Security (HSTS)
    • Hodges, J., Jackson, C., Barth, A.: HTTP Strict Transport Security (HSTS). IETF RFC 6797 (2012)
    • (2012) IETF RFC
    • Hodges, J.1    Jackson, C.2    Barth, A.3
  • 22
    • 85029541226 scopus 로고
    • Functions as processes
    • In: Paterson, M. (ed.)
    • Milner, R.: Functions as processes. In: Paterson, M. (ed.) ICALP 1990. LNCS, vol. 443, pp. 167-180. Springer, Heidelberg (1990)
    • (1990) ICALP 1990. LNCS , vol.443 , pp. 167-180
    • Milner, R.1
  • 23
    • 77950845925 scopus 로고    scopus 로고
    • Symmetric cryptography in JavaScript
    • Stark, E., Hamburg, M., Boneh, D.: Symmetric cryptography in JavaScript. In: ACSAC, pp. 373-381 (2009)
    • (2009) ACSAC , pp. 373-381
    • Stark, E.1    Hamburg, M.2    Boneh, D.3
  • 26
    • 84878355933 scopus 로고    scopus 로고
    • Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services
    • Wang, R., Chen, S., Wang, X.: Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services. In: IEEE S&P, pp. 365-379. IEEE Computer Society (2012)
    • (2012) IEEE S&Amp;P , pp. 365-379
    • Wang, R.1    Chen, S.2    Wang, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.