Some web sites provide interactive extensions using browser scripts, often without inspecting the scripts to verify that they are benign and bug-free. Others handle users’ conď¬...
Alexander Yip, Neha Narula, Maxwell N. Krohn, Robe...
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
It is now common for Web sites to use active Web content, such as Flash, Silverlight, or Java applets, to support rich, interactive applications. For many mobile devices, however,...
Alexander Moshchuk, Steven D. Gribble, Henry M. Le...
This paper introduces a tool known as the Haptic Drum Kit, which employs four computer-controlled vibrotactile devices, one attached to each wrist and ankle. In the applications d...
Simon Holland, Anders J. Bouwer, Mathew Dalgelish,...
Although mobile Java code is frequently executed on many wireless devices, the susceptibility to electromagnetic (EM) attacks is largely unknown. If analysis of EM waves emanating...