Sciweavers

74 search results - page 6 / 15
» Cross-Site Framing Attacks
Sort
View
CCS
2011
ACM
13 years 11 months ago
SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications
We empirically analyzed sanitizer use in a shipping web application with over 400,000 lines of code and over 23,244 methods, the largest empirical analysis of sanitizer use of whi...
Prateek Saxena, David Molnar, Benjamin Livshits

Publication
117views
14 years 7 months ago
Design, Implementation, and Performance Analysis of DiscoSec–Service Pack for Securing WLANs
To improve the already tarnished reputation of WLAN security, the new IEEE 802.11i security standard provides means for an enhanced user authentication and strong data confidential...
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, F...
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
15 years 5 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp
ICPR
2008
IEEE
15 years 5 months ago
A scene-based video watermarking technique using SVMs
In this paper we present a scene-based video watermarking scheme using support vector machines (SVMs). In a given scene, the algorithm uses the first h′ frames to train an embed...
Shwu-Huey Yen, Hsiao-Wei Chang, Chia-Jen Wang, Pat...
DSN
2004
IEEE
15 years 3 months ago
A Defense-Centric Taxonomy Based on Attack Manifestations
Many classifications of attacks have been tendered, often in taxonomic form. A common basis of these taxonomies is that they have been framed from the perspective of an attacker
Kevin S. Killourhy, Roy A. Maxion, Kymie M. C. Tan