Secure input for Web applicationsWeb applications (English)
- New search for: Szydlowski, M.
- New search for: Kruegel, C.
- New search for: Kirda, E.
- New search for: Szydlowski, M.
- New search for: Kruegel, C.
- New search for: Kirda, E.
In:
Annual Computer Security Applications Conference, 23
;
375-384
;
2008
-
ISBN:
- Conference paper / Print
-
Title:Secure input for Web applicationsWeb applications
-
Contributors:
-
Published in:
-
Publisher:
- New search for: IEEE Operations Center
-
Place of publication:Piscataway
-
Publication date:2008
-
Size:10 Seiten, 27 Quellen
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
So You Think You Can Dance?Kemmerer, Richard A. et al. | 2007
- 19
-
Establishing and Sustaining System Integrity via Root of Trust InstallationClair, Luke St. / Schiffman, Joshua / Jaeger, Trent / McDaniel, Patrick et al. | 2007
- 30
-
Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-VotingKiayias, Aggelos / Michel, Laurent / Russell, Alexander / Shashidhar, Narasimha / See, Andrew / Shvartsman, Alexander / Davtyan, Seda et al. | 2007
- 40
-
Toward a Medium-Robustness Separation Kernel Protection ProfileDeLong, Rance J. / Nguyen, Thuy D. / Irvine, Cynthia E. / Levin, Timothy E. et al. | 2007
- 53
-
Improving Signature Testing through Dynamic Data Flow AnalysisKruegel, Christopher / Balzarotti, Davide / Robertson, William / Vigna, Giovanni et al. | 2007
- 64
-
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like NetworksXie, Mengjun / Wu, Zhenyu / Wang, Haining et al. | 2007
- 74
-
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic WormsGundy, Matthew Van / Chen, Hao / Su, Zhendong / Vigna, Giovanni et al. | 2007
- 87
-
Toward Realistic and Artifact-Free Insider-Threat DataKillourhy, Kevin S. / Maxion, Roy A. et al. | 2007
- 97
-
Database Isolation and Filtering against Data Corruption AttacksYu, Meng / Zang, Wanyu / Liu, Peng et al. | 2007
- 107
-
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL InjectionKosuga, Yuji / Kono, Kenji / Hanaoka, Miyuki / Hishiyama, Miho / Takahama, Yu et al. | 2007
- 119
-
Closed-Circuit Unobservable Voice over IPMelchor, Carlos Aguilar / Deswarte, Yves / Iguchi-Cartigny, Julien et al. | 2007
- 129
-
SSARES: Secure Searchable Automated Remote Email StorageAviv, Adam J. / Locasto, Michael E. / Potter, Shaya / Keromytis, Angelos D. et al. | 2007
- 141
-
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)Aggarwal, Sudhir / Bali, Jasbinder / Duan, Zhenhai / Kermes, Leo / Liu, Wayne / Sahai, Shahank / Zhu, Zhenghui et al. | 2007
- 151
-
Efficiency Issues of Rete-Based Expert Systems for Misuse DetectionMeier, Michael / Flegel, Ulrich / Schmerl, Sebastian et al. | 2007
- 161
-
Tracking Darkports for Network DefenseWhyte, David / Oorschot, Paul C. van / Kranakis, Evangelos et al. | 2007
- 173
-
Personal Privacy without Computational Obscurity: Rethinking Privacy Protection Strategies for Open Information NetworksWeitzner, Daniel J. et al. | 2007
- 177
-
Distributed Secure Systems: Then and NowRandell, Brian / Rushby, John et al. | 2007
- 201
-
Extensible Pre-authentication KerberosHellewell, Phillip L. / Seamons, Kent E. et al. | 2007
- 211
-
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAPRadhakrishnan, Manigandan / Solworth, Jon A. et al. | 2007
- 221
-
Retrofitting the IBM POWER Hypervisor to Support Mandatory Access ControlValdez, Enriquillo / Sailer, Reiner / Perez, Ronald et al. | 2007
- 233
-
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile DevicesIon, Iulia / Dragovic, Boris / Crispo, Bruno et al. | 2007
- 243
-
Countering False Accusations and Collusion in the Detection of In-Band WormholesSterne, Daniel / Lawler, Geoffrey / Gopaul, Richard / Rivera, Brian / Marcus, Kelvin / Kruus, Peter et al. | 2007
- 257
-
Efficient Distributed Detection of Node Replication Attacks in Sensor NetworksZhu, Bo / Addada, Venkata Gopala Krishna / Setia, Sanjeev / Jajodia, Sushil / Roy, Sankardas et al. | 2007
- 269
-
Security Usability Principles for Vulnerability Analysis and Risk AssessmentJøsang, Audun / AlFayyadh, Bander / Grandison, Tyrone / AlZomai, Mohammed / McNamara, Judith et al. | 2007
- 279
-
Breaking Visual CAPTCHAs with Naive Pattern Recognition AlgorithmsYan, Jeff / Ahmad, Ahmad Salah El et al. | 2007
- 292
-
Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control PoliciesCentonze, Paolina / Flynn, Robert J. / Pistoia, Marco et al. | 2007
- 305
-
Routing in the Dark: Pitch BlackEvans, Nathan S. / GauthierDickey, Chris / Grothoff, Christian et al. | 2007
- 315
-
Centralized Security Labels in Decentralized P2P NetworksTsybulnik, Nathalie / Hamlen, Kevin W. / Thuraisingham, Bhavani et al. | 2007
- 325
-
A Taxonomy of Botnet StructuresDagon, David / Gu, Guofei / Lee, Christopher P. / Lee, Wenke et al. | 2007
- 341
-
An Overview of the Annex SystemGrove, D. A. / Owen, C. A. / North, C. J. / Jones, J. A. / Beaumont, M. R. / Hopkins, B. D. et al. | 2007
- 353
-
Efficient Detection of Delay-Constrained Relay NodesCoskun, Baris / Memon, Nasir et al. | 2007
- 363
-
Bonsai: Balanced Lineage AuthenticationGehani, Ashish / Lindqvist, Ulf et al. | 2007
- 375
-
Secure input for Web applicationsWeb applicationsSzydlowski, M. / Kruegel, C. / Kirda, E. et al. | 2008
- 375
-
Secure Input for Web ApplicationsSzydlowski, Martin / Kruegel, Christopher / Kirda, Engin et al. | 2007
- 385
-
Secure and Flexible Monitoring of Virtual MachinesPayne, Bryan D. / Carbone, Martim D. P. De A. / Lee, Wenke et al. | 2007
- 398
-
Automated Format String Attack Prevention for Win32/X86 BinariesLi, Wei / Chiueh, Tzi-cker et al. | 2007
- 411
-
MetaAware: Identifying Metamorphic MalwareZhang, Qinghua / Reeves, Douglas S. et al. | 2007
- 421
-
Limits of Static Analysis for Malware DetectionMoser, Andreas / Kruegel, Christopher / Kirda, Engin et al. | 2007
- 431
-
OmniUnpack: Fast, Generic, and Safe Unpacking of MalwareMartignoni, Lorenzo / Christodorescu, Mihai / Jha, Somesh et al. | 2007
- 443
-
Channels: Runtime System Infrastructure for Security-Typed LanguagesHicks, Boniface / Misiak, Tim / McDaniel, Patrick et al. | 2007
- 453
-
Automated Security Debugging Using Program Structural ConstraintsKil, Chongkyung / Sezer, Emre Can / Ning, Peng / Zhang, Xiaolan et al. | 2007
- 463
-
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual MachineChandra, Deepak / Franz, Michael et al. | 2007
- 477
-
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input CraftingSparks, Sherri / Embleton, Shawn / Cunningham, Ryan / Zou, Cliff et al. | 2007
- 487
-
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or StackSlowinska, Asia / Bos, Herbert et al. | 2007
- 501
-
Spector: Automatically Analyzing Shell CodeBorders, Kevin / Prakash, Atul / Zielinski, Mark et al. | 2007
- 515
-
Author index| 2007
- c1
-
Twenty-Third Annual Computer Security Applications Conference - Cover| 2007
- i
-
Twenty-Third Annual Computer Security Applications Conference - Title| 2007
- iv
-
Twenty-Third Annual Computer Security Applications Conference - Copyright| 2007
- v
-
Twenty-Third Annual Computer Security Applications Conference - TOC| 2007
- x
-
Welcome from the Conference Chair| 2007
- xi
-
Welcome from the Program Chairs| 2007
- xii
-
Conference Committee| 2007
- xiii
-
Program Committee| 2007
- xiv
-
Additional Reviewers and Tutorial Reviewers| 2007
- xv
-
ACSAC Steering Committee| 2007
- xvi
-
Sponsor: Applied Computer Security Associates| 2007