-
2
-
-
85094669614
-
-
NebuAd Service Providers. Aug
-
NebuAd / Service Providers. http://www.nebuad.com/providers/providers.php, Aug. 2007.
-
(2007)
-
-
-
10
-
-
84877755220
-
Peering Through the Shroud: The Effect of Edge Opacity on IP-Based Client Identification
-
Apr
-
M. Casado and M. J. Freedman. Peering Through the Shroud: The Effect of Edge Opacity on IP-Based Client Identification. In NSDI, Apr. 2007.
-
(2007)
NSDI
-
-
Casado, M.1
Freedman, M. J.2
-
11
-
-
33750328206
-
Opportunistic Measurement: Extracting Insight from Spurious Traffic
-
M. Casado, T. Garfinkel, W. Cui, V. Paxson, and S. Savage. Opportunistic Measurement: Extracting Insight from Spurious Traffic. In HotNets-IV, 2005.
-
(2005)
HotNets-IV
-
-
Casado, M.1
Garfinkel, T.2
Cui, W.3
Paxson, V.4
Savage, S.5
-
12
-
-
85094649590
-
-
Chinese Internet Security Response Team. Oct
-
Chinese Internet Security Response Team. ARP attack to CISRT.org. http://www.cisrt.org/enblog/read.php?172, Oct. 2007.
-
(2007)
ARP attack to CISRT.org
-
-
-
16
-
-
0038520415
-
Reducing WWW Latency and Bandwidth Requirements by Real-Time Distillation
-
May
-
A. Fox and E. A. Brewer. Reducing WWW Latency and Bandwidth Requirements by Real-Time Distillation. In WWW, May 1996.
-
(1996)
WWW
-
-
Fox, A.1
Brewer, E. A.2
-
17
-
-
70349410893
-
-
Google
-
Google. Google Analytics. http://www.google.com/analytics/, 2008.
-
(2008)
Google Analytics
-
-
-
18
-
-
85094655349
-
-
Aug
-
D. Gryaznov. Keeping up with Nuwar. http://www.avertlabs.com/research/blog/index.php/ 2007/08/15/keeping-up-with-nuwar/, Aug. 2007.
-
(2007)
Keeping up with Nuwar
-
-
Gryaznov, D.1
-
19
-
-
85094668443
-
-
Grypen. June
-
Grypen. CastleCops: About Grypen's Filter Set. http://www.castlecops.com/t124920-About_Grypens_Filter_Set.html, June 2005.
-
(2005)
CastleCops: About Grypen's Filter Set
-
-
-
21
-
-
19944365247
-
Securing Web Application Code by Static Analysis and Runtime Protection
-
May
-
Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D. T. Lee, and S.-Y. Kuo. Securing Web Application Code by Static Analysis and Runtime Protection. In WWW, May 2004.
-
(2004)
WWW
-
-
Huang, Y.-W.1
Yu, F.2
Hang, C.3
Tsai, C.-H.4
Lee, D. T.5
Kuo, S.-Y.6
-
22
-
-
85094679102
-
A Proposal and Implementation of Automatic Detection/Collection System for Cross-Site Scripting Vulnerability
-
O. Ismail, M. Etoh, Y. Kadobayashi, and S. Yamaguichi. A Proposal and Implementation of Automatic Detection/Collection System for Cross-Site Scripting Vulnerability. In AINA, 2004.
-
(2004)
AINA
-
-
Ismail, O.1
Etoh, M.2
Kadobayashi, Y.3
Yamaguichi, S.4
-
23
-
-
35348860223
-
Defeating Script Injection Attacks with Browser-Enforced Embedded Policies
-
May
-
T. Jim, N. Swamy, and M. Hicks. Defeating Script Injection Attacks with Browser-Enforced Embedded Policies. In WWW, May 2007.
-
(2007)
WWW
-
-
Jim, T.1
Swamy, N.2
Hicks, M.3
-
24
-
-
70450045370
-
AjaxScope: A Platform for Remotely Monitoring the Client-Side Behavior of Web 2.0 Applications
-
Nov
-
E. Kiciman and B. Livshits. AjaxScope: A Platform for Remotely Monitoring the Client-Side Behavior of Web 2.0 Applications. In SOSP, Nov. 2007.
-
(2007)
SOSP
-
-
Kiciman, E.1
Livshits, B.2
-
25
-
-
84988573115
-
The Design and Implementation of Tripwire: A File System Integrity Checker
-
Nov
-
G. H. Kim and E. H. Spafford. The Design and Implementation of Tripwire: A File System Integrity Checker. In CCS, Nov. 1994.
-
(1994)
CCS
-
-
Kim, G. H.1
Spafford, E. H.2
-
27
-
-
84872956076
-
iPlane: An Information Plane for Distributed Services
-
Nov
-
H. V. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, and A. Venkataramani. iPlane: An Information Plane for Distributed Services. In OSDI, Nov. 2006.
-
(2006)
OSDI
-
-
Madhyastha, H. V.1
Isdal, T.2
Piatek, M.3
Dixon, C.4
Anderson, T.5
Krishnamurthy, A.6
Venkataramani, A.7
-
28
-
-
85094677109
-
-
Microsoft Developer Network. Oct
-
Microsoft Developer Network. Mark of the Web. http://msdn2.microsoft.com/en-us/library/ms537628.aspx, Oct. 2007.
-
(2007)
Mark of the Web
-
-
-
30
-
-
85076780225
-
BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML
-
Nov
-
C. Reis, J. Dunagan, H. J. Wang, O. Dubrovsky, and S. Esmeir. BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML. In OSDI, Nov. 2006.
-
(2006)
OSDI
-
-
Reis, C.1
Dunagan, J.2
Wang, H. J.3
Dubrovsky, O.4
Esmeir, S.5
-
32
-
-
77953069969
-
Abstracting Application-Level Web Security
-
May
-
D. Scott and R. Sharp. Abstracting Application-Level Web Security. In WWW, May 2002.
-
(2002)
WWW
-
-
Scott, D.1
Sharp, R.2
-
33
-
-
85094650386
-
-
sidki. Proxomitron. Sept
-
sidki. Proxomitron. http://www.geocities.com/sidki3003/prox.html, Sept. 2007.
-
(2007)
-
-
-
34
-
-
84859711884
-
-
Symantec.com. Feb
-
Symantec.com. Adware.LinkMaker. http://symantec.com/security_response/ writeup.jsp?docid=2005-030218-4635-99, Feb. 2007.
-
(2007)
Adware.LinkMaker
-
-
-
35
-
-
84859710179
-
-
Symantec.com. June
-
Symantec.com. W32.Arpiframe. http://symantec.com/security_response/ writeup.jsp?docid=2007-061222-0609-99, June 2007.
-
(2007)
W32.Arpiframe
-
-
-
38
-
-
84887309913
-
Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In NDSS, 2007.
-
(2007)
NDSS
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
41
-
-
0038030410
-
An Integrated Experimental Environment for Distributed Systems and Networks
-
Dec
-
B. White, J. Lepreau, L. Stoller, R. Ricci, S. Guruprasad, M. Newbold, M. Hibler, C. Barb, and A. Joglekar. An Integrated Experimental Environment for Distributed Systems and Networks. In OSDI, Dec. 2002.
-
(2002)
OSDI
-
-
White, B.1
Lepreau, J.2
Stoller, L.3
Ricci, R.4
Guruprasad, S.5
Newbold, M.6
Hibler, M.7
Barb, C.8
Joglekar, A.9
-
42
-
-
84910681237
-
Static Detection of Security Vulnerabilities in Scripting Languages
-
Aug
-
Y. Xie and A. Aiken. Static Detection of Security Vulnerabilities in Scripting Languages. In USENIX Security, Aug. 2006.
-
(2006)
USENIX Security
-
-
Xie, Y.1
Aiken, A.2
|