Filters








2,990 Hits in 5.7 sec

How to Break XML Encryption - Automatically

Dennis Kupser, Christian Mainka, Jörg Schwenk, Juraj Somorovsky
2015 Workshop on Offensive Technologies  
In order to protect XML Encryption implementations, the World Wide Web Consortium (W3C) published an updated version of the standard.  ...  In the recent years, XML Encryption became a target of several new attacks [18, 17, 16] .  ...  Acknowledgements We would like to thank Colm O hEigeartaigh (Apache CXF), Krithika Prakash (IBM), and Philipp Schöne (Axway) for their cooperation.  ... 
dblp:conf/woot/KupserMSS15 fatcat:7vsgk7ri2zfvtgasm2vwjsvcsq

Lightweight Automatic Error Detection by Monitoring Collar Variables [chapter]

João Santos, Rui Abreu
2012 Lecture Notes in Computer Science  
Two different patterns were investigated to determine which variables to monitor.  ...  This paper studies the impact of using simple variable patterns to detect the so-called system's collar variables to reduce the number of variables to be monitored (instrumented).  ...  -XML-Security -a XML signature and encryption library from the Apache Santuario 3 project. In Table 3 some details of the applications used are shown.  ... 
doi:10.1007/978-3-642-34691-0_16 fatcat:zs5up2fhsbe4dapaej4z6l3xj4

P3: Privacy Preservation Protocol for Automatic Appliance Control Application in Smart Grid

Depeng Li, Zeyar Aung, John Williams, Abel Sanchez
2014 IEEE Internet of Things Journal  
To address recently emerging concerns on privacy violations, this paper investigates possible sensitive information leakages and analyzes potential privacy threats in the automatic appliance control (AAC  ...  Experimental results demonstrate that our protocol merely incurs a substantially light overhead on the AAC application, yet is able to address and solve the formidable privacy challenges both customers  ...  No matter how many formats utilized in the Input subsystem, they all can be parsed into a standardized format, XML-based entries.  ... 
doi:10.1109/jiot.2014.2358578 fatcat:nsmkndfdxzfc3oaxsraehheru4

Autochain platform: expert automatic algorithm Blockchain technology for house rental dApp image application model

Seong-Kyu Kim, Jun-Ho Huh
2020 EURASIP Journal on Image and Video Processing  
to a remarkable extent.  ...  It also allows the Autochain to apply Blockchain technology to existing businesses conducted under the Fourth Industrial Revolution to realize higher productivity or competitiveness and improve profitability  ...  The languages used were Java, XML, Python, Jason, etc., and they were developed using the JVM (Java Virtual Machine), GVM (Geoblus Virtual Machine), and middleware programs.  ... 
doi:10.1186/s13640-020-00537-z fatcat:inbhg4ot4feofi3zotyb2qvl24

A System for Automatic Evaluation of Programs for Correctness and Performance [chapter]

Amit Kumar Mandal, Chittaranjan Mandal, Chris Reade
2007 Lecture Notes in Business Information Processing  
The tool provides on-line support to both the evaluators and students with the level of granularity, flexibility and consistency that is difficult or impossible to achieve manually.  ...  This paper describes a model and implementation of a system for automatically testing, evaluating, grading and providing critical feedback for the submitted programming assignments.  ...  The XML is used to specify the following information: (1)Name of the files to be submitted by the students. (2)How to generate the test cases. (3)How to generate the makefile. (4)Marks distribution for  ... 
doi:10.1007/978-3-540-74063-6_29 fatcat:k7tnjvpnqjexzjy67npu3tlg74

AdIDoS – Adaptive and Intelligent Fully-Automatic Detection of Denial-of-Service Weaknesses in Web Services [chapter]

Christian Altmeier, Christian Mainka, Juraj Somorovsky, Jörg Schwenk
2016 Lecture Notes in Computer Science  
This allows one to automatically detect message size limits or element count restrictions.  ...  Web services apply parsing technologies to process incoming XML messages.  ...  Acknowledgements We would like to thank our anonymous reviewers for their helpful comments.  ... 
doi:10.1007/978-3-319-29883-2_5 fatcat:2cuxmpyrevhsbprugbnvpfigie

Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities

Robert Merget, Juraj Somorovsky, Nimrod Aviram, Craig Young, Janis Fliegenschmidt, Jörg Schwenk, Yuval Shavitt
2019 Zenodo  
The TLS protocol provides encryption, data integrity, and authentication on the modern Internet.  ...  Contrary to common wisdom, exploiting CBC padding oracles does not necessarily require performing precise timing measurements.  ...  Additionally, we would like to thank the Amazon, Citrix and OpenSSL teams for their professional responses and help with disclosure.  ... 
doi:10.5281/zenodo.3610260 fatcat:ikmlnvrjb5hydkl2zvdfz2yxwe

Heterogeneous Data and Big Data Analytics

Lidong Wang
2017 Automatic Control and Information Sciences  
These tools help to automatically build semi-structured knowledge.  ...  Deep learning algorithms use a huge amount of unsupervised data to automatically extract complex representation.  ... 
doi:10.12691/acis-3-1-3 fatcat:t3yzrk4r2bfornki34khobe4su

Fortifying web-based applications automatically

Shuo Tang, Nathan Dautenhahn, Samuel T. King
2011 Proceedings of the 18th ACM conference on Computer and communications security - CCS '11  
In this paper we introduce Zan 1 , a browserbased system for applying new browser security mechanisms to legacy web apps automatically.  ...  new security mechanisms to existing web apps.  ...  We also would like to thank the anonymous reviewers for their thorough and helpful comments and feedback.  ... 
doi:10.1145/2046707.2046777 dblp:conf/ccs/TangDK11 fatcat:zqi66is2vjealitufdzds4uzai

Application of computer algebra systems in automatic assessment of math skills

Przemyslaw Kajetanowicz, Jedrzej Wierzejewski
2008 Teaching Mathematics and Computer Science  
The results of an exam can be automatically stored in a database with all authentication and security requirements satisfied.  ...  It has been two years now that the authors develop and use Web-based math courses where the assessment of student's progress is fully automatic.  ...  xml file.  ... 
doi:10.5485/tmcs.2008.0187 fatcat:g6gshx5qsjavhcygxxkbuxhhxu

Semi-automatic binary protection tampering

Yoann Guillot, Alexandre Gazet
2009 Journal in Computer Virology  
Through two examples, we illustrate some particularly interesting protection families and try to show their limits and how to remove them to recover a binary which is close to the original code.  ...  This editor takes as input a .graphml file, this file format is based on XML and dedicated to graph description (Fig. 39) .  ...  Examination of the handler's form: -How many basic blocks are there? -How these blocks are laid out? -How many exit points?  ... 
doi:10.1007/s11416-009-0118-4 fatcat:w25z3wtnyzdqhcj2onsvkvgkzq

Formally based semi-automatic implementation of an open security protocol

Alfredo Pironti, Davide Pozza, Riccardo Sisto
2012 Journal of Systems and Software  
This paper presents an experiment in which an implementation of the client side of the SSH Transport Layer Protocol (SSH-TLP) was semi-automatically derived according to a model-driven development paradigm  ...  that leverages formal methods in order to obtain high correctness assurance.  ...  Acknowledgments We would like to thank Bruno Blanchet for his valuable support in the verification phase of our case study.  ... 
doi:10.1016/j.jss.2011.10.052 fatcat:mkmmbplh3raipe75bf23ko3gfu

Shadow attacks: automatically evading system-call-behavior based malware detection

Weiqin Ma, Pu Duan, Sanmin Liu, Guofei Gu, Jyh-Charn Liu
2011 Journal in Computer Virology  
To demonstrate the feasibility of this attack, we have developed a compiler-level prototype tool, AutoShadow, to automatically generate shadow-process version of malware given the source code of original  ...  We hope our preliminary study can foster more discussion and research to improve current generation of behavior-based malware detectors to address this great potential threat before it becomes a security  ...  We leave detailed discussion on how to automatically partition a given malware code to its shadow-process version to next section.  ... 
doi:10.1007/s11416-011-0157-5 fatcat:v6jjw3chrbgyhegkwyskmuozjq

Automatic API Usage Scenario Documentation from Technical Q A Sites [article]

Gias Uddin and Foutse Khomh and Chanchal K Roy
2021 arXiv   pre-print
However, we are aware of no previous research that attempts to automatically produce API documentation from SO by considering both API code examples and reviews.  ...  In this paper, we present two novel algorithms that can be used to automatically produce API documentation from SO by combining code examples and reviews towards those examples.  ...  software modules, messaging format over HTTP as a replacement of XML, in encryption techniques, and on-the-fly conversion of Language-based objects to JSON formats, etc.We parsed the dataset to collect  ... 
arXiv:2102.08502v1 fatcat:oib254bdwfa2blc45wkkf3yvnq

DEVELOPMENT OF AN OPEN-SOURCE AUTOMATIC DEFORMATION MONITORING SYSTEM FOR GEODETICAL AND GEOTECHNICAL MEASUREMENTS

P. Engel, B. Schweimler
2016 The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences  
and data management in automatic deformation monitoring.  ...  It will be discussed how the development effort of networked applications can be reduced by using free programming tools, cloud computing technologies, and rapid prototyping methods.  ...  (Humble/Farley, 2010) DevOps To build reliable software, developers have to understand what the software is used for and more importantly how it is used.  ... 
doi:10.5194/isprs-archives-xl-5-w8-25-2016 fatcat:thwomi4debctfe7yylbp5bvacy
« Previous Showing results 1 — 15 out of 2,990 results