Sciweavers

381 search results - page 32 / 77
» Timing attacks on Web privacy
Sort
View
SP
2009
IEEE
129views Security Privacy» more  SP 2009»
15 years 6 months ago
CLAMP: Practical Prevention of Large-Scale Data Leaks
Providing online access to sensitive data makes web servers lucrative targets for attackers. A compromise of any of the web server’s scripts, applications, or operating system c...
Bryan Parno, Jonathan M. McCune, Dan Wendlandt, Da...
CCS
2007
ACM
15 years 6 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
ACSAC
2010
IEEE
14 years 9 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
AICCSA
2006
IEEE
128views Hardware» more  AICCSA 2006»
15 years 5 months ago
Avoiding Denial of Service via Stress Testing
Stress-testing has been widely used by businesses, governments, and other organizations to evaluate the strength of their web applications against various attacks. However, the qu...
Saeed Abu-Nimeh, Suku Nair, Marco F. Marchetti
CCS
2011
ACM
13 years 11 months ago
How to break XML encryption
XML Encryption was standardized by W3C in 2002, and is implemented in XML frameworks of major commercial and open-source organizations like Apache, redhat, IBM, and Microsoft. It ...
Tibor Jager, Somorovsky Juraj