Cybersecurity enterprises policies: A comparative study
Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but
also by national security. To safeguard an organization's cyberenvironments, information …
also by national security. To safeguard an organization's cyberenvironments, information …
[PDF][PDF] Collaboro: a collaborative (meta) modeling tool
JLC Izquierdo, J Cabot - PeerJ Computer Science, 2016 - peerj.com
Motivation Scientists increasingly rely on intelligent information systems to help them in their
daily tasks, in particular for managing research objects, like publications or datasets. The …
daily tasks, in particular for managing research objects, like publications or datasets. The …
CSP adoption: current status and future prospects
M Ying, SQ Li - Security and Communication Networks, 2016 - Wiley Online Library
Content security policy (CSP) is a security mechanism that can be used to mitigate cross‐
site scripting (also known as XSS) and other related attacks. Although CSP is a promising …
site scripting (also known as XSS) and other related attacks. Although CSP is a promising …
[HTML][HTML] Fatal injection: A survey of modern code injection attack countermeasures
D Mitropoulos, D Spinellis - PeerJ Computer Science, 2017 - peerj.com
With a code injection attack (CIA) an attacker can introduce malicious code into a computer
program or system that fails to properly encode data that comes from an untrusted source. A …
program or system that fails to properly encode data that comes from an untrusted source. A …
How to train your browser: Preventing XSS attacks using contextual script fingerprints
D Mitropoulos, K Stroggylos, D Spinellis… - ACM Transactions on …, 2016 - dl.acm.org
Cross-Site Scripting (XSS) is one of the most common web application vulnerabilities. It is
therefore sometimes referred to as the “buffer overflow of the web.” Drawing a parallel from …
therefore sometimes referred to as the “buffer overflow of the web.” Drawing a parallel from …
Analysis and design of secure web services
A Saleem, AK Agarwal - Proceedings of Fifth International Conference on …, 2016 - Springer
This paper presents for the composition of software value a distributed data flow model as it
is widely distributed over the internet. These services are ruled by user and they are …
is widely distributed over the internet. These services are ruled by user and they are …
[PDF][PDF] Reviewing effectivity in security approaches towards strengthening internet architecture
MS Vidya, MC Patil - International Journal of Electrical and Computer …, 2019 - academia.edu
The usage of existing Internet architecture is shrouded by various security loopholes and
hence is highly ineffective towards resisting potential threats over internet. Hence, it is …
hence is highly ineffective towards resisting potential threats over internet. Hence, it is …
GUARDIA: specification and enforcement of javascript security policies without VM modifications
The complex architecture of browser technologies and dynamic characteristics of JavaScript
make it difficult to ensure security in client-side web applications. Browser-level security …
make it difficult to ensure security in client-side web applications. Browser-level security …
It's More Than Stealing Cookies-Exploitability of XSS
Web Application vulnerabilities are into existence since the beginning of the internet and the
world-wide web. In recent years, it has been given more importance considering the rapid …
world-wide web. In recent years, it has been given more importance considering the rapid …
[PDF][PDF] Attacking browser extensions
N Golubovic - Ruhr-Universitat Bochum, 2016 - golubovic.net
Browser extensions are extremely profitable targets for attackers due to their popularity and
privileges. This thesis examines both old and new attack techniques for Mozilla Firefox and …
privileges. This thesis examines both old and new attack techniques for Mozilla Firefox and …