Sciweavers

2213 search results - page 261 / 443
» Software Security
Sort
View
118
Voted
COMPSAC
2009
IEEE
15 years 7 months ago
On a Classification Approach for SOA Vulnerabilities
Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
Lutz Lowis, Rafael Accorsi
128
Voted
VMCAI
2005
Springer
15 years 9 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
CHI
2010
ACM
15 years 10 months ago
Investigating user account control practices
Non-administrator user accounts and the user account control (UAC) approach of Windows Vista are two practical solutions to limit the damage of malware infection. UAC in Windows V...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov
147
Voted
COMPSAC
2007
IEEE
15 years 10 months ago
A Static Analysis Framework For Detecting SQL Injection Vulnerabilities
Recently SQL Injection Attack (SIA) has become a major threat to Web applications. Via carefully crafted user input, attackers can expose or manipulate the back-end database of a ...
Xiang Fu, Xin Lu, Boris Peltsverger, Shijun Chen, ...
129
Voted
LISA
2001
15 years 5 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman