Sciweavers

776 search results - page 118 / 156
» Securing user inputs for the web
Sort
View
USS
2008
15 years 2 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
119
Voted
MIRAGE
2007
Springer
15 years 6 months ago
Copying Behaviour of Expressive Motion
Abstract. In this paper we present an agent that can analyse certain human fullbody movements in order to respond in an expressive manner with copying behaviour. Our work focuses o...
Maurizio Mancini, Ginevra Castellano, Elisabetta B...
113
Voted
DKE
2007
130views more  DKE 2007»
15 years 14 days ago
Enabling access-privacy for random walk based data analysis applications
Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing. These models enable the desc...
Ping Lin, K. Selçuk Candan
98
Voted
SOUPS
2006
ACM
15 years 6 months ago
Power strips, prophylactics, and privacy, oh my!
While Internet users claim to be concerned about online privacy, their behavior rarely reflects those concerns. In this paper we investigate whether the availability of compariso...
Julia Gideon, Lorrie Faith Cranor, Serge Egelman, ...
PET
2010
Springer
15 years 4 months ago
Making a Nymbler Nymble Using VERBS
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, T...
Ryan Henry, Kevin Henry, Ian Goldberg