Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Mike Ter Louw"'
Autor:
Alfonso Piccirilli, Mike Ter Louw, Adrian R. Hartman, Lloyd Greenwald, Marc Jay Beacken, Michael J. Geller, Dominick J. Imbesi, Michael J. Chen, David J. Bishop, Linda Braun
Publikováno v:
Bell Labs Technical Journal. 16:5-28
In this paper we review some of the recent research in LGS's Government Communications Laboratory. In areas as far ranging as photonics, wireless/cellular systems, and Internet research, LGS is doing cutting edge work that solves important problems f
Publikováno v:
Journal in Computer Virology. 4:179-195
In this paper we examine security issues of functionality extension mechanisms supported by web browsers. Extensions (or “plug-ins”) in modern web browsers enjoy unrestrained access at all times and thus are attractive vectors for malware. To sol
Publikováno v:
MILCOM
We explore techniques for eliciting a behavioral description from an Android smartphone app in a controlled manner. A description of app behavior is useful for performing subsequent analysis such as model checking, for example to verify the app satis
Autor:
V. N. Venkatakrishnan, Prithvi Bisht, Michelle Zhou, Kalpana Gondi, Mike Ter Louw, Karthik Thotta Ganesh
Publikováno v:
Information Systems Security ISBN: 9783642177132
ICISS
ICISS
As the World Wide Web continues to evolve, the number of web-based attacks that target web applications is on the rise. Attacks such as Cross-site Scripting (XSS), SQL Injection and Cross-site Request Forgery (XSRF) are among the topmost threats on t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f3d93e38a0612e438f9dd77ef44fcb2f
https://doi.org/10.1007/978-3-642-17714-9_2
https://doi.org/10.1007/978-3-642-17714-9_2
Autor:
Mike Ter Louw, V. N. Venkatakrishnan
Publikováno v:
IEEE Symposium on Security and Privacy
As social networking sites proliferate across the World Wide Web, complex user-created HTML content is rapidly becoming the norm rather than the exception. User-created web content is a notorious vector for cross-site scripting (XSS) attacks that tar
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment ISBN: 9783540736134
DIMVA
DIMVA
In this paper we examine the security issues in functionality extension mechanisms supported by web browsers. Extensions (or "plug-ins") in modern web browsers enjoy unlimited power without restraint and thus are attractive vectors for malware. To so
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3d65175b70b7268132ba9abeef744cff
https://doi.org/10.1007/978-3-540-73614-1_1
https://doi.org/10.1007/978-3-540-73614-1_1