A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
ZigZag: Automatically Hardening Web Applications Against Client-side Validation Vulnerabilities
2015
USENIX Security Symposium
Our evaluation demonstrates that ZigZag is capable of automatically hardening client-side code against both known and previously-unknown vulnerabilities. ...
In this paper, we present ZigZag, a system for hardening JavaScript-based web applications against clientside validation attacks. ...
In this paper, we propose ZigZag, a system for hardening JavaScript-based web applications against clientside validation attacks. ...
dblp:conf/uss/WeissbacherRKKV15
fatcat:wgnwujqwmfeanadkr5ga37l5iy
Daonity – Grid security from two levels of virtualization
2007
Information Security Technical Report
With an assumed degree of tamper protection on the TPM and its integration to the platform (tamper-evidence is more valid assumption with the server side), TCG in fact assumes a platform owner a potential ...
Requirements We aim to create a tamper-resistant execution environment for security sensitive grid applications by applying TCG technologies to hardening the OS. ...
The RTS location for storing confidentiality data is a straightforward application of the well-known cryptographic key management technique. ...
doi:10.1016/j.istr.2007.05.005
fatcat:jrjpgg4bcrei5phgapsddcahmi
Plugging in trust and privacy : three systems to improve widely used ecosystems
[article]
2014
AppGuard enables the enforcement of fine-grained privacy policies on third-party applications in Android to protect the users privacy. vii First of all, I am deeply indebted to my Bachelor, Master, and ...
The implementation at the server side is integrated to the Apache Web server, whereas the client-side implementation leverages the Mozilla Firefox Web browser. ...
HTTPi was implemented for Microsoft's IIS 7.0 Web server and at the client-side for Internet Explorer 8. ...
doi:10.22028/d291-26590
fatcat:t6au7fg5zbf4zcqypcqok526jm
Modern Applied Science, Vol. 3, No. 5, May 2009, all in one file, Part B
2009
Modern Applied Science
Three different defect geometries were experimentally investigated and the validity of the analytical model was verified. ...
In computer network applications, especially in e-commerce applications, the computer's identity authentication method which can effectively prevent fake identity log in is very important technology. ...
return the match result and the user information to the client side. ...
doi:10.5539/mas.v3n5p0b
fatcat:gutemdaurvcpdcmghp4m3xvz3i
) 1. Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving Hongfeng Zhu 1001-1009 A Publicly Verifiable Secret Sharing Scheme Based on Multilinear Diffie-Hellman Assumption Qiao Peng
2016
International Journal of Network Security
unpublished
The client side program CSP will returns metr i ∈ M, (i = 1, 2, ..., n). The enrollment process is shown in Figure ? ?. ...
The machine-metrics authentication protocol involves three parties: A server (S), a remote user (U ) and Client Side Program CSP . ...
We introduced an approach of an automatic alert unification system that deals with heterogeneous alert signatures. The result is a set of unified alerts. ...
fatcat:nivpmyymvvecpft6npkuhw7smi
The progress of romance: literary historiography and the Gothic novel
1997
ChoiceReviews
Against the Grain: Essays 1975. London: Verso, 1986. . ...
ciple; 2) then comes the application of it-the constructional principle seeks the easiest mode of application; 3) it spreads over the largest possible range of phe nomena; 4) it becomes automatized and ...
But my own hypotheses are vulnerable to the same sort of critique that I level against others. ...
doi:10.5860/choice.34-2637
fatcat:nrsuccragrekbefblby25fsice
2. The Social Relations of Production
[chapter]
2019
Working Construction
According to its web-side www.sido.go.tz SIDO is actively promoting linkages between the corporate sector and SMEs and encouraging commercial sponsorship for marketing events. networking with other ...
Figure 2 . 7 : 27 The technological development process as a zigzag selection process. ...
doi:10.7591/9781501729294-004
fatcat:ouidm2t3fjgnhhij2lkikef5nm
3D printing-as-a-service for collaborative engineering
[article]
2017
To further the advance the availability and applicability of 3D printing, this thesis identifies the problems that currently exist and attempts to solve them. ...
For further research, the complete 3D-PP must be analysed for vulnerabilities and methods to ensure appropriate protection against internal and external threats. ...
Automatic abort for this 3D print can be set in this case per conőguration.
Results For the validation of this approach, an experiment is devised. ...
doi:10.18419/opus-9339
fatcat:rhvxl44ma5dvfcexvbmdmwgxvi
Images in Language, Media, and Mind
1995
College composition and communication
When he addresses Inouye as "you up there" and speaks of 20,000 telegrams "in our room outside the corridor here," he is positioning himself and his client on the side of the people. ...
Emotional ads accomplish this work more or less automatically. ...
doi:10.2307/358338
fatcat:duwc6wzyxjfsblg5ib44hdub5e
PARALLEL IRELANDS: THE DISENCHANTMENT AND RE-ENCHANTMENT OF IONA
2017
The Journal of Natural and Social Philosophy
unpublished
You can check all this on the web. ...
No, silly, you can't find this on the web! ...
We were left with an arms imbalance of 1:19 against the Ulster volunteers following the sinking of the Aud and arrest of the humanitarian Roger Casement occasioned by your betrayal of us. ...
fatcat:gjin5foxbzfxhmcwobdhodzfem
The Architectural Subject: Space, Character, and Gender in Four Eighteenth-Century Domestic Novels
2012
Belford agrees, urging Lovelace to remove himself and Clarissa from the brothel: "Hardened as thou art, I know that they are the abandoned people in the house who keep thee up to a resolution against her ...
Set against the attempts to elevate or lower her, however,
). ...
doi:10.7939/r3wq05
fatcat:wlz4sttrxzbcne2ywvmhz5scmq
Incommunicado reader
[article]
2008
in the use and application of Linux. ...
The (unmanned) aircraft will be used against terrorism as well as against irregular migration. ...
doi:10.22028/d291-23522
fatcat:4d34n5s22jhkfcmgz6uvagviie
Make Straight in the Desert a Highway: Ideology and Environmental Conflict on the Colorado Plateau
2011
unpublished
And to Holly, my polar star, I thank for taking the long and winding road by my side. As the Psalmist states, "My steps have held to your paths; my feet have not slipped." ...
These many layers of organic matter eventually hardened. ...
On the Burr Trail, the courts sided with the county's claim that it had the valid right-of-way to the western portion of the road. ...
fatcat:6whzc5xghbbvzky66pibmxvfgu
Study of innovative autonomous marine vehicles for monitoring in remote areas and shallow waters The Shallow Water Autonomous Multipurpose Platform (SWAMP)
[article]
2020
An interesting test was done on the impacting (crashing) fig. 7 .19 of the vehicle against a pier and against a rock. ...
In some cases semi-automatic wire-propelled systems are used as shown in [29] . ...
doi:10.15167/odetti-angelo_phd2020-04-28
fatcat:z25senairbaapoqzmz4g3svlke
Architecture in the Data-driven City
2019
A valid fear about big data is that with more and more detailed information we become vulnerable to manipulation by companies, government, and criminals. ...
Though the Sweets hotel concept is web-platform based, it could not exist absent the careful application of architectural intelligence. ...
activities and desire to live close to it. 110 Partisanship in a controversial context like the Heathrow Expansion may seem disingenuous: do you really think you can push one position so hard the other side ...
doi:10.5075/epfl-thesis-9554
fatcat:mpq7n242ijgw5o3aq6hn5yf7he
« Previous
Showing results 1 — 15 out of 27 results