Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Timothy L. Hinrichs"'
Publikováno v:
EPiC Series in Computing.
Model checking and runtime verification are pillars of formal verification but for the most part are used independently. In this position paper we argue that the formal verification community would be well-served by developing theory, algorithms, imp
Publikováno v:
Journal of Computer Security. 22:415-465
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client in web forms. Malicious users who circumvent the client can capitalize on the missing
Autor:
Timothy L. Hinrichs, Daniele Rossetti, V. N. Venkatakrishnan, Lenore D. Zuck, A. Prasad Sistla, Gabriele Petronella
Publikováno v:
PLAS
WEBLOG is a declarative language for web application development designed to automatically eliminate several security vulnerabilities common to today's web applications. In this paper, we introduce Weblog, detail the security vulnerabilities it elimi
Autor:
Adam J. Lee, Diego Martinoia, Timothy L. Hinrichs, Lenore D. Zuck, Alessandro Panebianco, William C. Garrison
Publikováno v:
CSF
Access control schemes come in all shapes and sizes, which makes choosing the right one for a particular application a challenge. Yet today's techniques for comparing access control schemes completely ignore the setting in which the scheme is to be d
Autor:
V. N. Venkatakrishnan, Nazari Skrupsky, Timothy L. Hinrichs, Lenore D. Zuck, Maliheh Monshizadeh, Prithvi Bisht
Publikováno v:
CyberSecurity
The current practice of Web application development treats the client and server components of the application as two separate pieces of software. Each component is written independently, usually in distinct programming languages and development plat
Publikováno v:
NSPW
Access control is an area where one size does not fit all. However, previous work in access control has focused solely on expressiveness as an absolute measure. Thus, we discuss and justify the need for a new type of evaluation framework for access c
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642294198
Formal Aspects in Security and Trust
Formal Aspects in Security and Trust
Logical policy-based access control models are greatly expressive and thus provide the flexibility for administrators to represent a wide variety of authorization policies. Extensional access control models, on the other hand, utilize simple data str
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cc6d08990e162e0e46830470b76de31b
https://doi.org/10.1007/978-3-642-29420-4_13
https://doi.org/10.1007/978-3-642-29420-4_13
Publikováno v:
ACM Conference on Computer and Communications Security
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious users who circumvent the client can capitalize on the missing server valida
Autor:
Timothy L. Hinrichs
Publikováno v:
Practical Aspects of Declarative Languages ISBN: 9783642183775
PADL
PADL
Modern web forms interact with the user in real-time by detecting errors and filling-in implied values, which in terms of automated reasoning amounts to SAT solving and theorem proving. This paper presents PLATO, a compiler that automatically generat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::74f18117baa430b8ed7c3417f22873ef
https://doi.org/10.1007/978-3-642-18378-2_7
https://doi.org/10.1007/978-3-642-18378-2_7
Autor:
Timothy L. Hinrichs, Nazari Skrupsky, V. N. Venkatakrishnan, Prithvi Bisht, Radoslaw Bobrowicz
Publikováno v:
ACM Conference on Computer and Communications Security
Web applications rely heavily on client-side computation to examine and validate form inputs that are supplied by a user (e.g., "credit card expiration date must be valid"). This is typically done for two reasons: to reduce burden on the server and t