Current network management architectures are using different models to define management information objects. These definitions actually also include, in a non-formal way, the defi...
Current software attacks often build on exploits that subvert machine-code execution. The enforcement of a basic safety property, Control-Flow Integrity (CFI), can prevent such at...
A number of research systems have demonstrated the benefits of accompanying each request with a machine-checkable proof that the request complies with access-control policy — a...
Lujo Bauer, Limin Jia, Michael K. Reiter, David Sw...
Cross-site scripting (or XSS) has been the most dominant class of web vulnerabilities in 2007. The main underlying reason for XSS vulnerabilities is that web markup and client-sid...
Ubiquitous computing systems can be regarded as open systems where heterogeneous and previously unknown entities may spontaneously interact, due to intrinsic mobility of users and...