Sciweavers

499 search results - page 49 / 100
» A Study on Latent Vulnerabilities
Sort
View
CCS
2009
ACM
15 years 7 months ago
XCS: cross channel scripting and its impact on web applications
We study the security of embedded web servers used in consumer electronic devices, such as security cameras and photo frames, and for IT infrastructure, such as wireless access po...
Hristo Bojinov, Elie Bursztein, Dan Boneh
83
Voted
FC
2009
Springer
106views Cryptology» more  FC 2009»
15 years 7 months ago
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed a...
Tyler Moore, Richard Clayton
93
Voted
RAID
2009
Springer
15 years 7 months ago
Brave New World: Pervasive Insecurity of Embedded Network Devices
Abstract. Embedded network devices have become an ubiquitous fixture in the modern home, office as well as in the global communication infrastructure. Devices like routers, NAS ap...
Ang Cui, Yingbo Song, Pratap V. Prabhu, Salvatore ...
93
Voted
SP
2007
IEEE
110views Security Privacy» more  SP 2007»
15 years 6 months ago
A Systematic Approach to Uncover Security Flaws in GUI Logic
To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
José Meseguer, Ralf Sasse, Helen J. Wang, Y...
102
Voted
SOUPS
2006
ACM
15 years 6 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...