Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Neef, Sebastian"'
Publikováno v:
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2024, pages 1523 to 1538
Coverage-guided fuzz testing has received significant attention from the research community, with a strong focus on binary applications, greatly disregarding other targets, such as web applications. The importance of the World Wide Web in everyone's
Externí odkaz:
http://arxiv.org/abs/2406.06261
Autor:
Neef, Sebastian, Oudeh, Maath
Unrestricted file upload (UFU) is a class of web security vulnerabilities that can have a severe impact on web applications if uploaded files are not sufficiently validated or securely handled. A review of related work shows an increased interest in
Externí odkaz:
http://arxiv.org/abs/2405.16619
Autor:
Franke, Max, Neef, Sebastian
Home fiber connections are largely realized by using passive optical networks, in their most common form today relying on the GPON standard. Among other things, this standard specifies how the first node inside of customers' homes, the so called ONU
Externí odkaz:
http://arxiv.org/abs/2310.05687
Autor:
Neef, Sebastian, Wisiol, Nils
Publikováno v:
In: Beresford, A.R., Patra, A., Bellini, E. (eds) Cryptology and Network Security. CANS 2022. Lecture Notes in Computer Science, vol 13641. Springer, Cham
The SSH protocol is commonly used to access remote systems on the Internet, as it provides an encrypted and authenticated channel for communication. If upon establishing a new connection, the presented server key is unknown to the client, the user is
Externí odkaz:
http://arxiv.org/abs/2208.08846
Autor:
Neef, Sebastian
Throughout recent years, the importance of internet-privacy has continuously risen. [...] Browser fingerprinting is a technique that does not require cookies or persistent identifiers. It derives a sufficiently unique identifier from the various brow
Externí odkaz:
http://arxiv.org/abs/2210.11300
Autor:
Neef, Sebastian
Wikipedia, an open collaborative website, can be edited by anyone, even anonymously, thus becoming victim to ill-intentioned changes. Therefore, ranking Wikipedia authors by calculating impact measures based on the edit history can help to identify r
Externí odkaz:
http://arxiv.org/abs/1709.01142
This book constitutes the proceedings of the 21st International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2024, held in Lausanne, Switzerland, during July 17–19, 2024. The 22 full papers and 6 short pap
This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022. The conference was took place in Abu Dhabi, United Arab Emirates.The 18 ful
Autor:
Tim Philipp Schäfers
Der Erfolg des E-Commerce hat auch seine Schattenseiten: Hackerangriffe im Web gehören inzwischen zum Alltag. Es geht dabei nicht nur um unsichere Firewalls oder Fehler in Betriebssystemen, häufig stellt die selbst programmierte Webapplikation das
Autor:
Thomas Schulz
Die Digitalisierung verändert die industrielle Fertigung grundlegend! Das Internet of Things, die Machine-to- Machine-Kommunikation und die vernetzte Produktion lassen keinen technologischen Teilbereich oder Branche unberührt. Diese vierte industri