Sciweavers

6 search results - page 1 / 2
» A Procedure for Verifying Security Against Type Confusion At...
Sort
View
CSFW
2003
IEEE
13 years 9 months ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows
WWW
2005
ACM
14 years 4 months ago
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
Existing Web browsers handle security errors in a manner that often confuses users. In particular, when a user visits a secure site whose certificate the browser cannot verify, th...
José Carlos Brustoloni, Xia Brustoloni
CORR
2010
Springer
59views Education» more  CORR 2010»
13 years 4 months ago
Efficient Password-Typed Key Agreement Scheme
In this paper, we will study Lee, Kim and Yoo, a verifier password typed key agreement scheme and demonstrate that the scheme is not secure. Then, the authors will propose an enha...
Sattar J. Aboud
ACSC
2007
IEEE
13 years 8 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
CARDIS
2008
Springer
165views Hardware» more  CARDIS 2008»
13 years 6 months ago
Malicious Code on Java Card Smartcards: Attacks and Countermeasures
When it comes to security, an interesting difference between Java Card and regular Java is the absence of an on-card bytecode verifier on most Java Cards. In principle this opens u...
Wojciech Mostowski, Erik Poll