-
1
-
-
85084160402
-
Rootkits for JavaScript environments
-
B. Adida, A. Barth, and C. Jackson. Rootkits for JavaScript environments. In WOOT, 2009.
-
(2009)
WOOT
-
-
Adida, B.1
Barth, A.2
Jackson, C.3
-
3
-
-
84857879906
-
Multiple facets for dynamic information flow
-
T. Austin and C. Flanagan. Multiple facets for dynamic information flow. In POPL, pages 165-178, 2012.
-
(2012)
POPL
, pp. 165-178
-
-
Austin, T.1
Flanagan, C.2
-
4
-
-
84881236986
-
JavaSPI: A framework for security protocol implementation
-
M. Avalle, A. Pironti, D. Pozza, and R. Sisto. JavaSPI: A framework for security protocol implementation. International Journal of Secure Software Engineering, 2:34-48, 2011.
-
(2011)
International Journal of Secure Software Engineering
, vol.2
, pp. 34-48
-
-
Avalle, M.1
Pironti, A.2
Pozza, D.3
Sisto, R.4
-
5
-
-
85076318210
-
Keys to the cloud: Formal analysis and concrete attacks on encrypted web storage
-
C. Bansal, K. Bhargavan, A. Delignat-Lavaud, and S. Maffeis. Keys to the cloud: Formal analysis and concrete attacks on encrypted web storage. In POST, 2013.
-
(2013)
POST
-
-
Bansal, C.1
Bhargavan, K.2
Delignat-Lavaud, A.3
Maffeis, S.4
-
6
-
-
84866927100
-
Discovering concrete attacks on website authorization by formal analysis
-
C. Bansal, K. Bhargavan, and S. Maffeis. Discovering concrete attacks on website authorization by formal analysis. In CSF, pages 247-262, 2012.
-
(2012)
CSF
, pp. 247-262
-
-
Bansal, C.1
Bhargavan, K.2
Maffeis, S.3
-
7
-
-
77954611153
-
Attacks on JavaScript mashup communication
-
A. Barth, C. Jackson, and W. Li. Attacks on JavaScript mashup communication. In W2SP, 2009.
-
(2009)
W2SP
-
-
Barth, A.1
Jackson, C.2
Li, W.3
-
10
-
-
85084162607
-
Web-based attacks on host-proof encrypted storage
-
K. Bhargavan and A. Delignat-Lavaud. Web-based attacks on host-proof encrypted storage. In WOOT, 2012.
-
(2012)
WOOT
-
-
Bhargavan, K.1
Delignat-Lavaud, A.2
-
12
-
-
33947683919
-
Verified interoperable implementations of security protocols
-
K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse. Verified interoperable implementations of security protocols. In CSFW, pages 139-152, 2006.
-
(2006)
CSFW
, pp. 139-152
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Tse, S.4
-
14
-
-
84976755024
-
F-bounded polymorphism for object-oriented programming
-
P. Canning, W. Cook, W. Hill, W. Olthoff, and J. Mitchell. F-bounded polymorphism for object-oriented programming. In FPCA, pages 273-280, 1989.
-
(1989)
FPCA
, pp. 273-280
-
-
Canning, P.1
Cook, W.2
Hill, W.3
Olthoff, W.4
Mitchell, J.5
-
17
-
-
84869386885
-
FlowFox: A web browser with flexible and precise information flow control
-
W. De Groef, D. Devriese, N. Nikiforakis, and F. Piessens. FlowFox: a web browser with flexible and precise information flow control. In CCS, pages 748-759, 2012.
-
(2012)
CCS
, pp. 748-759
-
-
De Groef, W.1
Devriese, D.2
Nikiforakis, N.3
Piessens, F.4
-
19
-
-
70349266256
-
Verifiable functional purity in Java
-
M. Finifter, A. Mettler, N. Sastry, and D. Wagner. Verifiable functional purity in Java. In CCS, pages 161-174. ACM, 2008.
-
(2008)
CCS
, pp. 161-174
-
-
Finifter, M.1
Mettler, A.2
Sastry, N.3
Wagner, D.4
-
20
-
-
85180542459
-
Preventing capability leaks in secure JavaScript subsets
-
M. Finifter, J. Weinberger, and A. Barth. Preventing Capability Leaks in Secure JavaScript Subsets. In BDSS, 2010.
-
(2010)
BDSS
-
-
Finifter, M.1
Weinberger, J.2
Barth, A.3
-
21
-
-
84874150343
-
Fully abstract compilation to JavaScript
-
C. Fournet, N. Swamy, J. Chen, P. Dagand, P. Strub, and B. Livshits. Fully abstract compilation to JavaScript. In POPL'13, 2013.
-
(2013)
POPL'13
-
-
Fournet, C.1
Swamy, N.2
Chen, J.3
Dagand, P.4
Strub, P.5
Livshits, B.6
-
22
-
-
85076288737
-
-
P. Haack. JSON hijacking. http://hhacked.com/2009/06/25/json-hijacking.aspx, 2009.
-
(2009)
JSON Hijacking
-
-
Haack, P.1
-
23
-
-
84895539842
-
The OAuth 2.0 authorization framework
-
D. Hardt. The OAuth 2.0 authorization framework. IETF RFC 6749, 2012.
-
(2012)
IETF RFC 6749
-
-
Hardt, D.1
-
24
-
-
84866904012
-
Information-flow security for a core of JavaScript
-
D. Hedin and A. Sabelfeld. Information-flow security for a core of JavaScript. In CSF, pages 3-18, 2012.
-
(2012)
CSF
, pp. 3-18
-
-
Hedin, D.1
Sabelfeld, A.2
-
26
-
-
80051985460
-
Isolating JavaScript with filters, rewriting, and wrappers
-
S. Maffeis, J. C. Mitchell, and A. Taly. Isolating JavaScript with filters, rewriting, and wrappers. In ESORICS'09, 2009.
-
(2009)
ESORICS'09
-
-
Maffeis, S.1
Mitchell, J.C.2
Taly, A.3
-
28
-
-
77955186827
-
ConScript: Specifying and enforcing fine-grained security policies for JavaScript in the browser
-
L. Meyerovich and B. Livshits. ConScript: Specifying and enforcing fine-grained security policies for JavaScript in the browser. In IEEE S & P, 2010.
-
(2010)
IEEE S & P
-
-
Meyerovich, L.1
Livshits, B.2
-
33
-
-
0003663728
-
Type inference in the presence of subtyping: From theory to practice
-
September
-
F. Pottier. Type inference in the presence of subtyping: from theory to practice. Research Report 3483, INRIA, September 1998.
-
(1998)
Research Report 3483, INRIA
-
-
Pottier, F.1
-
34
-
-
34848907433
-
BrowserShield: Vulnerability-driven filtering of dynamic HTML
-
C. Reis, J. Dunagan, H. Wang, O. Dubrovsky, and S. Esmeir. BrowserShield: Vulnerability-driven filtering of dynamic HTML. ACM Transactions on the Web, 1(3), 2007.
-
(2007)
ACM Transactions on the Web
, vol.1
, Issue.3
-
-
Reis, C.1
Dunagan, J.2
Wang, H.3
Dubrovsky, O.4
Esmeir, S.5
-
35
-
-
80755172908
-
Busting frame busting: A study of clickjacking vulnerabilities at popular sites
-
G. Rydstedt, E. Bursztein, D. Boneh, and C. Jackson. Busting frame busting: a study of clickjacking vulnerabilities at popular sites. In W2SP'10, 2010.
-
(2010)
W2SP'10
-
-
Rydstedt, G.1
Bursztein, E.2
Boneh, D.3
Jackson, C.4
-
36
-
-
85076320560
-
On breaking SAML: Be whoever you want to be
-
J. Somorovsky, A. Mayer, A. Worth, J. Schwenk, M. Kampmann, and M. Jensen. On breaking SAML: Be whoever you want to be. In WOOT, 2012.
-
(2012)
WOOT
-
-
Somorovsky, J.1
Mayer, A.2
Worth, A.3
Schwenk, J.4
Kampmann, M.5
Jensen, M.6
-
37
-
-
77950845925
-
Symmetric cryptography in JavaScript
-
E. Stark, M. Hamburg, and D. Boneh. Symmetric cryptography in JavaScript. In ACSAC, pages 373-381, 2009.
-
(2009)
ACSAC
, pp. 373-381
-
-
Stark, E.1
Hamburg, M.2
Boneh, D.3
-
39
-
-
80052006519
-
Automated analysis of security-critical JavaScript APIs
-
A. Taly, Ú. Erlingsson, J. C. Mitchell, M. Miller, and J. Nagra. Automated analysis of security-critical JavaScript APIs. In IEEE S & P, 2011.
-
(2011)
IEEE S & P
-
-
Taly, A.1
Erlingsson, U.2
Mitchell, J.C.3
Miller, M.4
Nagra, J.5
-
41
-
-
84878355933
-
Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services
-
IEEE Computer Society
-
R. Wang, S. Chen, and X. Wang. Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services. In IEEE S & P, pages 365-379. IEEE Computer Society, 2012.
-
(2012)
IEEE S & P
, pp. 365-379
-
-
Wang, R.1
Chen, S.2
Wang, X.3
-
42
-
-
80051991045
-
How to shop for free online - Security analysis of cashier-as-a-service based web stores
-
R. Wang, S. Chen, X. Wang, and S. Qadeer. How to shop for free online - security analysis of cashier-as-a-service based web stores. In IEEE S & P, pages 465-480, 2011.
-
(2011)
IEEE S & P
, pp. 465-480
-
-
Wang, R.1
Chen, S.2
Wang, X.3
Qadeer, S.4
|