Deep learning and big data technologies for IoT security

MA Amanullah, RAA Habeeb, FH Nasaruddin… - Computer …, 2020 - Elsevier
Technology has become inevitable in human life, especially the growth of Internet of Things
(IoT), which enables communication and interaction with various devices. However, IoT has …

Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art

S Gupta, BB Gupta - … Journal of System Assurance Engineering and …, 2017 - Springer
Nowadays, web applications are becoming one of the standard platforms for representing
data and service releases over the World Wide Web. Since web applications are …

Automatic creation of SQL injection and cross-site scripting attacks

A Kieyzun, PJ Guo, K Jayaraman… - 2009 IEEE 31st …, 2009 - ieeexplore.ieee.org
We present a technique for finding security vulnerabilities in Web applications. SQL Injection
(SQLI) and cross-site scripting (XSS) attacks are widespread forms of attack in which the …

Static detection of cross-site scripting vulnerabilities

G Wassermann, Z Su - Proceedings of the 30th international conference …, 2008 - dl.acm.org
Web applications support many of our daily activities, but they often have security problems,
and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an attacker …

Links: Web programming without tiers

E Cooper, S Lindley, P Wadler, J Yallop - International Symposium on …, 2006 - Springer
Links is a programming language for web applications that generates code for all three tiers
of a web application from a single source, compiling into JavaScript to run on the client and …

Reining in the web with content security policy

S Stamm, B Sterne, G Markham - … of the 19th international conference on …, 2010 - dl.acm.org
The last three years have seen a dramatic increase in both awareness and exploitation of
Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-profile attacks against …

Staged information flow for JavaScript

R Chugh, JA Meister, R Jhala, S Lerner - Proceedings of the 30th ACM …, 2009 - dl.acm.org
Modern websites are powered by JavaScript, a flexible dynamic scripting language that
executes in client browsers. A common paradigm in such websites is to include third-party …

An empirical study of privacy-violating information flows in JavaScript web applications

D Jang, R Jhala, S Lerner, H Shacham - … of the 17th ACM conference on …, 2010 - dl.acm.org
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy
violating information flows. We present an empirical study of the prevalence of such flows on …

ConScript: Specifying and enforcing fine-grained security policies for Javascript in the browser

LA Meyerovich, B Livshits - 2010 IEEE Symposium on Security …, 2010 - ieeexplore.ieee.org
Much of the power of modern Web comes from the ability of a Web page to combine content
and JavaScript code from disparate servers on the same page. While the ability to create …

Securing web applications from injection and logic vulnerabilities: Approaches and challenges

G Deepa, PS Thilagam - Information and Software Technology, 2016 - Elsevier
Context: Web applications are trusted by billions of users for performing day-to-day activities.
Accessibility, availability and omnipresence of web applications have made them a prime …