Sciweavers

146 search results - page 23 / 30
» Embedding Secret Data in HTML Web Page
Sort
View
POPL
2007
ACM
15 years 10 months ago
JavaScript instrumentation for browser security
It is well recognized that JavaScript can be exploited to launch browser-based security attacks. We propose to battle such attacks using program instrumentation. Untrusted JavaScr...
Dachuan Yu, Ajay Chander, Nayeem Islam, Igor Serik...
JIB
2008
76views more  JIB 2008»
14 years 10 months ago
WebStruct and VisualStruct: web interfaces and visualization for Structure software implemented in a cluster environment
Structure, is a widely used software tool to investigate population genetic structure with multi-locus genotyping data. The software uses an iterative algorithm to group individua...
B. Jayashree, S. Rajgopal, David A. Hoisington, V....
SAC
2006
ACM
15 years 4 months ago
Noxes: a client-side solution for mitigating cross-site scripting attacks
Web applications are becoming the dominant way to provide access to on-line services. At the same time, web application vulnerabilities are being discovered and disclosed at an al...
Engin Kirda, Christopher Krügel, Giovanni Vig...
PVLDB
2010
161views more  PVLDB 2010»
14 years 8 months ago
Annotating and Searching Web Tables Using Entities, Types and Relationships
Tables are a universal idiom to present relational data. Billions of tables on Web pages express entity references, attributes and relationships. This representation of relational...
Girija Limaye, Sunita Sarawagi, Soumen Chakrabarti
POPL
2006
ACM
15 years 10 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann