메뉴 건너뛰기




Volumn , Issue , 2011, Pages

WebShield: Enabling Various Web Defense Techniques without Client Side Modifications

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY; WEBSITES;

EID: 85030494194     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (17)

References (36)
  • 1
    • 84874550218 scopus 로고    scopus 로고
    • Alexa Top Sites. http://www.alexa.com/topsites/global.
    • Alexa Top Sites
  • 4
    • 85180622488 scopus 로고    scopus 로고
    • JavaScript Games. http://javascript.internet.com/games/.
    • JavaScript Games
  • 5
    • 85180623494 scopus 로고    scopus 로고
    • JSON. http://json.org/.
  • 7
    • 85180627420 scopus 로고    scopus 로고
    • Opera Mini. http://en.wikipedia.org/wiki/ Opera_Mini.
    • Opera Mini
  • 9
    • 85180628179 scopus 로고    scopus 로고
    • TC. http://pupa.da.ru/tc/.
  • 15
    • 33750703981 scopus 로고    scopus 로고
    • Latency and player actions in online games
    • M. Claypool and K. Claypool. Latency and player actions in online games. Commun. ACM, 49(11):40–45, 2006.
    • (2006) Commun. ACM , vol.49 , Issue.11 , pp. 40-45
    • Claypool, M.1    Claypool, K.2
  • 19
    • 84856138620 scopus 로고    scopus 로고
    • Mashupos: operating system abstractions for client mashups
    • J. Howell, C. Jackson, H. J. Wang, and X. Fan. Mashupos: operating system abstractions for client mashups. In HotOS, 2007.
    • (2007) HotOS
    • Howell, J.1    Jackson, C.2    Wang, H. J.3    Fan, X.4
  • 20
    • 74049104017 scopus 로고    scopus 로고
    • Ripley: Automatically securing web 2.0 applications through replicated execution
    • B. L. K.Vikram, Abhishek Prateek. Ripley: Automatically securing web 2.0 applications through replicated execution. In CCS, 2009.
    • (2009) CCS
    • Vikram, B. L. K.1    Prateek, Abhishek2
  • 21
    • 77951290909 scopus 로고    scopus 로고
    • Co-browsing dynamic web pages
    • D. Lowet and D. Goergen. Co-browsing dynamic web pages. In Proc of WWW, 2009.
    • (2009) Proc of WWW
    • Lowet, D.1    Goergen, D.2
  • 22
    • 0034479192 scopus 로고    scopus 로고
    • Secure execution of java applets using a remote playground
    • D. Malkhi and M. K. Reiter. Secure execution of java applets using a remote playground. IEEE Trans. on Software Engineering, 26(12), 2000.
    • (2000) IEEE Trans. on Software Engineering , vol.26 , Issue.12
    • Malkhi, D.1    Reiter, M. K.2
  • 25
    • 57349143314 scopus 로고    scopus 로고
    • Flashproxy: transparently enabling rich web content via remote execution
    • A. Moshchuk, S. D. Gribble, and H. M. Levy. Flashproxy: transparently enabling rich web content via remote execution. In Proc. of ACM MobiSys, 2008.
    • (2008) Proc. of ACM MobiSys
    • Moshchuk, A.1    Gribble, S. D.2    Levy, H. M.3
  • 26
    • 78650896178 scopus 로고    scopus 로고
    • Document structure integrity: A robust basis for cross-site scripting defense
    • Y. Nadji, P. Saxena, and D. Song. Document structure integrity: A robust basis for cross-site scripting defense. In Proc. of NDSS, 2009.
    • (2009) Proc. of NDSS
    • Nadji, Y.1    Saxena, P.2    Song, D.3
  • 27
    • 85180627627 scopus 로고    scopus 로고
    • NSA. SELinux. http://www.nsa.gov/research/selinux/.
    • SELinux
  • 30
    • 84924734121 scopus 로고    scopus 로고
    • Nozzle: A defense against heap-spraying code injection attacks
    • P. Ratanaworabhan, B. Livshits, and B. Zorn. Nozzle: A defense against heap-spraying code injection attacks. In USENIX Security, 2009.
    • (2009) USENIX Security
    • Ratanaworabhan, P.1    Livshits, B.2    Zorn, B.3
  • 32
    • 84898939129 scopus 로고    scopus 로고
    • Isolating web programs in modern browser architectures
    • C. Reis and S. D. Gribble. Isolating web programs in modern browser architectures. In Proc. of Eurosys, 2009.
    • (2009) Proc. of Eurosys
    • Reis, C.1    Gribble, S. D.2
  • 36
    • 84904088330 scopus 로고    scopus 로고
    • Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
    • Y.-M. Wang, D. Beck, X. Jiang, and R. Roussev. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In Proc. of NDSS, 2006.
    • (2006) Proc. of NDSS
    • Wang, Y.-M.1    Beck, D.2    Jiang, X.3    Roussev, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.