Sciweavers

20 search results - page 1 / 4
» Protecting Legacy Applications from Unicode
Sort
View
ICETE
2004
101views Business» more  ICETE 2004»
13 years 6 months ago
Protecting Legacy Applications from Unicode
: While XML-based Web Service architectures are successfully turning the Web into an infrastructure for cooperating applications, not all problems with respect to interoperability ...
Erik Wilde
WWW
2006
ACM
14 years 5 months ago
Safeguard against unicode attacks: generation and applications of UC-simlist
A severe potential security problem in utilization of Unicode in the Web is identified, which is resulted from the fact that there are many similar characters in the Unicode Chara...
Anthony Y. Fu, Wan Zhang, Xiaotie Deng, Liu Wenyin
WCRE
1999
IEEE
13 years 8 months ago
A Tool for Securely Integrating Legacy Systems into a Distributed Environment
Legacy systems provide services that remain useful beyond the means of the technology in which they were originally implemented. Our Legacy Wrapper tool packages the services of a...
Timothy S. Souder, Spiros Mancoridis
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
12 years 2 days ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
CCS
2011
ACM
12 years 4 months ago
Fortifying web-based applications automatically
Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (...
Shuo Tang, Nathan Dautenhahn, Samuel T. King