Filters








27 Hits in 6.6 sec

ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities

Michael Weissbacher, William K. Robertson, Engin Kirda, Christopher Kruegel, Giovanni Vigna
2015 USENIX Security Symposium  
Our evaluation demonstrates that ZigZag is capable of automatically hardening client-side code against both known and previously-unknown vulnerabilities.  ...  In this paper, we present ZigZag, a system for hardening JavaScript-based web applications against clientside validation attacks.  ...  In this paper, we propose ZigZag, a system for hardening JavaScript-based web applications against clientside validation attacks.  ... 
dblp:conf/uss/WeissbacherRKKV15 fatcat:wgnwujqwmfeanadkr5ga37l5iy

Daonity – Grid security from two levels of virtualization

Haibo Chen, Jieyun Chen, Wenbo Mao, Fei Yan
2007 Information Security Technical Report  
With an assumed degree of tamper protection on the TPM and its integration to the platform (tamper-evidence is more valid assumption with the server side), TCG in fact assumes a platform owner a potential  ...  Requirements We aim to create a tamper-resistant execution environment for security sensitive grid applications by applying TCG technologies to hardening the OS.  ...  The RTS location for storing confidentiality data is a straightforward application of the well-known cryptographic key management technique.  ... 
doi:10.1016/j.istr.2007.05.005 fatcat:jrjpgg4bcrei5phgapsddcahmi

Plugging in trust and privacy : three systems to improve widely used ecosystems [article]

Sebastian Rainer Gerling, Universität Des Saarlandes, Universität Des Saarlandes
2014
AppGuard enables the enforcement of fine-grained privacy policies on third-party applications in Android to protect the users privacy. vii First of all, I am deeply indebted to my Bachelor, Master, and  ...  The implementation at the server side is integrated to the Apache Web server, whereas the client-side implementation leverages the Mozilla Firefox Web browser.  ...  HTTPi was implemented for Microsoft's IIS 7.0 Web server and at the client-side for Internet Explorer 8.  ... 
doi:10.22028/d291-26590 fatcat:t6au7fg5zbf4zcqypcqok526jm

Modern Applied Science, Vol. 3, No. 5, May 2009, all in one file, Part B

Editor MAS
2009 Modern Applied Science  
Three different defect geometries were experimentally investigated and the validity of the analytical model was verified.  ...  In computer network applications, especially in e-commerce applications, the computer's identity authentication method which can effectively prevent fake identity log in is very important technology.  ...  return the match result and the user information to the client side.  ... 
doi:10.5539/mas.v3n5p0b fatcat:gutemdaurvcpdcmghp4m3xvz3i

) 1. Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving Hongfeng Zhu 1001-1009 A Publicly Verifiable Secret Sharing Scheme Based on Multilinear Diffie-Hellman Assumption Qiao Peng

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+91 others)
2016 International Journal of Network Security   unpublished
The client side program CSP will returns metr i ∈ M, (i = 1, 2, ..., n). The enrollment process is shown in Figure ? ?.  ...  The machine-metrics authentication protocol involves three parties: A server (S), a remote user (U ) and Client Side Program CSP .  ...  We introduced an approach of an automatic alert unification system that deals with heterogeneous alert signatures. The result is a set of unified alerts.  ... 
fatcat:nivpmyymvvecpft6npkuhw7smi

The progress of romance: literary historiography and the Gothic novel

1997 ChoiceReviews  
Against the Grain: Essays 1975. London: Verso, 1986. .  ...  ciple; 2) then comes the application of it-the constructional principle seeks the easiest mode of application; 3) it spreads over the largest possible range of phe nomena; 4) it becomes automatized and  ...  But my own hypotheses are vulnerable to the same sort of critique that I level against others.  ... 
doi:10.5860/choice.34-2637 fatcat:nrsuccragrekbefblby25fsice

2. The Social Relations of Production [chapter]

2019 Working Construction  
According to its web-side www.sido.go.tz SIDO is  actively promoting linkages between the corporate sector and SMEs and encouraging commercial sponsorship for marketing events.  networking with other  ...  Figure 2 . 7 : 27 The technological development process as a zigzag selection process.  ... 
doi:10.7591/9781501729294-004 fatcat:ouidm2t3fjgnhhij2lkikef5nm

3D printing-as-a-service for collaborative engineering [article]

Felix W. Baumann, Universität Stuttgart, Universität Stuttgart
2017
To further the advance the availability and applicability of 3D printing, this thesis identifies the problems that currently exist and attempts to solve them.  ...  For further research, the complete 3D-PP must be analysed for vulnerabilities and methods to ensure appropriate protection against internal and external threats.  ...  Automatic abort for this 3D print can be set in this case per conőguration. Results For the validation of this approach, an experiment is devised.  ... 
doi:10.18419/opus-9339 fatcat:rhvxl44ma5dvfcexvbmdmwgxvi

Images in Language, Media, and Mind

Roy E. Fox
1995 College composition and communication  
When he addresses Inouye as "you up there" and speaks of 20,000 telegrams "in our room outside the corridor here," he is positioning himself and his client on the side of the people.  ...  Emotional ads accomplish this work more or less automatically.  ... 
doi:10.2307/358338 fatcat:duwc6wzyxjfsblg5ib44hdub5e

PARALLEL IRELANDS: THE DISENCHANTMENT AND RE-ENCHANTMENT OF IONA

Seán Nualláin, Gearóid O' Colmáin, Joe Mccarthy, Gerald Gillespie, Frank Lillis, Glynn Custred, Brugha Ii, Hassan Ahmad, Eoin De Bhaldraithe, Mary Steiner, Joe Mccarthy, Gerald Gillespie (+6 others)
2017 The Journal of Natural and Social Philosophy   unpublished
You can check all this on the web.  ...  No, silly, you can't find this on the web!  ...  We were left with an arms imbalance of 1:19 against the Ulster volunteers following the sinking of the Aud and arrest of the humanitarian Roger Casement occasioned by your betrayal of us.  ... 
fatcat:gjin5foxbzfxhmcwobdhodzfem

The Architectural Subject: Space, Character, and Gender in Four Eighteenth-Century Domestic Novels

Mary M Chan
2012
Belford agrees, urging Lovelace to remove himself and Clarissa from the brothel: "Hardened as thou art, I know that they are the abandoned people in the house who keep thee up to a resolution against her  ...  Set against the attempts to elevate or lower her, however, ).  ... 
doi:10.7939/r3wq05 fatcat:wlz4sttrxzbcne2ywvmhz5scmq

Incommunicado reader [article]

(:Unkn) Unknown, Universität Des Saarlandes, Universität Des Saarlandes
2008
in the use and application of Linux.  ...  The (unmanned) aircraft will be used against terrorism as well as against irregular migration.  ... 
doi:10.22028/d291-23522 fatcat:4d34n5s22jhkfcmgz6uvagviie

Make Straight in the Desert a Highway: Ideology and Environmental Conflict on the Colorado Plateau

Jedediah Rogers, Paul Hirt, Stephen Pyne, Donald Fixico
2011 unpublished
And to Holly, my polar star, I thank for taking the long and winding road by my side. As the Psalmist states, "My steps have held to your paths; my feet have not slipped."  ...  These many layers of organic matter eventually hardened.  ...  On the Burr Trail, the courts sided with the county's claim that it had the valid right-of-way to the western portion of the road.  ... 
fatcat:6whzc5xghbbvzky66pibmxvfgu

Study of innovative autonomous marine vehicles for monitoring in remote areas and shallow waters The Shallow Water Autonomous Multipurpose Platform (SWAMP) [article]

ANGELO ODETTI
2020
An interesting test was done on the impacting (crashing) fig. 7 .19 of the vehicle against a pier and against a rock.  ...  In some cases semi-automatic wire-propelled systems are used as shown in [29] .  ... 
doi:10.15167/odetti-angelo_phd2020-04-28 fatcat:z25senairbaapoqzmz4g3svlke

Architecture in the Data-driven City

Frederick Peter Ortner
2019
A valid fear about big data is that with more and more detailed information we become vulnerable to manipulation by companies, government, and criminals.  ...  Though the Sweets hotel concept is web-platform based, it could not exist absent the careful application of architectural intelligence.  ...  activities and desire to live close to it. 110 Partisanship in a controversial context like the Heathrow Expansion may seem disingenuous: do you really think you can push one position so hard the other side  ... 
doi:10.5075/epfl-thesis-9554 fatcat:mpq7n242ijgw5o3aq6hn5yf7he
« Previous Showing results 1 — 15 out of 27 results