Zobrazeno 1 - 8
of 8
pro vyhledávání: '"Marco Squarcina"'
Publikováno v:
SP Workshops
2021 IEEE Security and Privacy Workshops (SPW)
2021 IEEE Security and Privacy Workshops (SPW)
Service workers boost the user experience of modern web applications by taking advantage of the Cache API to improve responsiveness and support offline usage. In this paper, we present the first security analysis of the threats posed by this programm
Publikováno v:
IEEE Symposium on Security and Privacy
2019 IEEE Symposium on Security and Privacy (SP)
2019 IEEE Symposium on Security and Privacy (SP)
HTTPS aims at securing communication over the Web by providing a cryptographic protection layer that ensures the confidentiality and integrity of communication and enables client/server authentication. However, HTTPS is based on the SSL/TLS protocol
Publikováno v:
Theoretical Computer Science
Theoretical Computer Science, Elsevier, 2019, 764, pp.42-60. ⟨10.1016/j.tcs.2018.05.002⟩
Theoretical Computer Science, 2019, 764, pp.42-60. ⟨10.1016/j.tcs.2018.05.002⟩
Theoretical Computer Science, Elsevier, 2019, 764, pp.42-60. ⟨10.1016/j.tcs.2018.05.002⟩
Theoretical Computer Science, 2019, 764, pp.42-60. ⟨10.1016/j.tcs.2018.05.002⟩
International audience
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::287bf73b05ff2667d5eba0e7edfd79fa
https://hal.archives-ouvertes.fr/hal-02082148
https://hal.archives-ouvertes.fr/hal-02082148
Publikováno v:
WWW (Companion Volume)
In this article, we survey the most common attacks against web sessions, that is, attacks that target honest web browser users establishing an authenticated session with a trusted web application. We then review existing security solutions that preve
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d665b31f11186b4a2e8f5dd3f7e7cf6b
http://hdl.handle.net/10278/3729048
http://hdl.handle.net/10278/3729048
Publikováno v:
NDSS
Autor:
Marco Squarcina, Riccardo Focardi
Publikováno v:
CSF
Cryptographic APIs are often vulnerable to attacks that compromise sensitive cryptographic keys. In the literature we find many proposals for preventing or mitigating such attacks but they typically require to modify the API or to configure it in a w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::75c570b1772a24709d50aa7d52ec087a
http://hdl.handle.net/10278/3693459
http://hdl.handle.net/10278/3693459
Publikováno v:
CSF
Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, verifying that such systems enforce the desired invariants is recognized as
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::aa327fb6c777f2c8c40d9677b86a5f72
http://hdl.handle.net/10278/39019
http://hdl.handle.net/10278/39019
Publikováno v:
Scopus-Elsevier
SQL injections are probably the most common vulnerability in Internet applications. They allow for injecting user selected input in database queries, getting access to sensitive data. Blind SQL Injections have the characteristic of never returning da
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9be143cfeff125cce9158bd29ed14912
http://www.scopus.com/inward/record.url?eid=2-s2.0-84871026268&partnerID=MN8TOARS
http://www.scopus.com/inward/record.url?eid=2-s2.0-84871026268&partnerID=MN8TOARS