Towards Elimination of Cross-Site Scripting on Mobile Versions of Web Applications (English)
- New search for: Javed, Ashar
- New search for: Schwenk, Jörg
- New search for: Javed, Ashar
- New search for: Schwenk, Jörg
In:
WISA, International Workshop on Information Security Applications, 14
;
103-123
;
2014
-
ISSN:
- Conference paper / Print
-
Title:Towards Elimination of Cross-Site Scripting on Mobile Versions of Web Applications
-
Contributors:Javed, Ashar ( author ) / Schwenk, Jörg ( author )
-
Published in:Lecture Notes in Computer Science ; 8267 ; 103-123
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2014
-
Size:21 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
LEA: A 128-Bit Block Cipher for Fast Encryption on Common ProcessorsHong, D. / Lee, J.-K. / Kim, D.-C. / Kwon, D. / Ryu, K.H. / Lee, D.-G. et al. | 2014
- 28
-
Some New Weaknesses in the RC4 Stream CipherLv, J. / Zhang, B. / Lin, D. et al. | 2014
- 39
-
Improvements on Reductions among Different Variants of SVP and CVPHu, G. / Pan, Y. et al. | 2014
- 52
-
A General Method to Evaluate the Correlation of Randomness TestsFan, L. / Chen, H. / Gao, S. et al. | 2014
- 65
-
Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social GraphsMohaisen, A. / Hollenbeck, S. et al. | 2014
- 81
-
Dynamic Surveillance: A Case Study with Enron Email Data SetDo, H. / Choi, P. / Lee, H. et al. | 2014
- 103
-
Towards Elimination of Cross-Site Scripting on Mobile Versions of Web ApplicationsJaved, A. / Schwenk, J. et al. | 2014
- 124
-
Punobot: Mobile Botnet Using Push Notification Service in AndroidLee, H. / Kang, T. / Lee, S. / Kim, J. / Kim, Y. et al. | 2014
- 138
-
Bifocals: Analyzing WebView Vulnerabilities in Android ApplicationsChin, E. / Wagner, D. et al. | 2014
- 163
-
We Are Still Vulnerable to Clickjacking Attacks: About 99 % of Korean Websites Are DangerousKim, D. / Kim, H. et al. | 2014
- 174
-
Resistance Is Not Futile: Detecting DDoS Attacks without Packet InspectionAthreya, A.P. / Wang, X. / Kim, Y.S. / Tian, Y. / Tague, P. et al. | 2014
- 189
-
SoK: Lessons Learned from SSL/TLS AttacksMeyer, C. / Schwenk, J. et al. | 2014
- 213
-
Foundational Security Principles for Medical Application PlatformsVasserman, E.Y. / Hatcliff, J. et al. | 2014
- 213
-
Foundational Security Principles for Medical Application Platforms. (Extended Abstract)Vasserman, Eugene Y. / Hatcliff, John et al. | 2014
- 218
-
Network Iron Curtain: Hide Enterprise Networks with OpenFlowSong, Y. / Shin, S. / Choi, Y. et al. | 2014
- 231
-
Towards a Methodical Evaluation of Antivirus Scans and LabelsMohaisen, A. / Alrawi, O. / Larson, M. / McPherson, D. et al. | 2014
- 231
-
Towards a Methodical Evaluation of Antivirus Scans and Labels. "If You're Not Confused, You're Not Paying Attention"Mohaisen, Aziz / Alrawi, Omar / Larson, Matt / McPherson, Danny et al. | 2014
- 245
-
Assured Supraliminal Steganography in Computer GamesMosunov, A. / Sinha, V. / Crawford, H. / Aycock, J. / de Castro, D.M.N. / Kumari, R. et al. | 2014
- 260
-
A Cloud and In-Memory Based Two-Tier Architecture of a Database Protection System from Insider AttacksMoon, C.S. / Chung, S. / Endicott-Popovsky, B. et al. | 2014