Cybersecurity enterprises policies: A comparative study

A Mishra, YI Alzoubi, AQ Gill, MJ Anwar - Sensors, 2022 - mdpi.com
Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but
also by national security. To safeguard an organization's cyberenvironments, information …

[PDF][PDF] Collaboro: a collaborative (meta) modeling tool

JLC Izquierdo, J Cabot - PeerJ Computer Science, 2016 - peerj.com
Motivation Scientists increasingly rely on intelligent information systems to help them in their
daily tasks, in particular for managing research objects, like publications or datasets. The …

CSP adoption: current status and future prospects

M Ying, SQ Li - Security and Communication Networks, 2016 - Wiley Online Library
Content security policy (CSP) is a security mechanism that can be used to mitigate cross‐
site scripting (also known as XSS) and other related attacks. Although CSP is a promising …

[HTML][HTML] Fatal injection: A survey of modern code injection attack countermeasures

D Mitropoulos, D Spinellis - PeerJ Computer Science, 2017 - peerj.com
With a code injection attack (CIA) an attacker can introduce malicious code into a computer
program or system that fails to properly encode data that comes from an untrusted source. A …

How to train your browser: Preventing XSS attacks using contextual script fingerprints

D Mitropoulos, K Stroggylos, D Spinellis… - ACM Transactions on …, 2016 - dl.acm.org
Cross-Site Scripting (XSS) is one of the most common web application vulnerabilities. It is
therefore sometimes referred to as the “buffer overflow of the web.” Drawing a parallel from …

Analysis and design of secure web services

A Saleem, AK Agarwal - Proceedings of Fifth International Conference on …, 2016 - Springer
This paper presents for the composition of software value a distributed data flow model as it
is widely distributed over the internet. These services are ruled by user and they are …

[PDF][PDF] Reviewing effectivity in security approaches towards strengthening internet architecture

MS Vidya, MC Patil - International Journal of Electrical and Computer …, 2019 - academia.edu
The usage of existing Internet architecture is shrouded by various security loopholes and
hence is highly ineffective towards resisting potential threats over internet. Hence, it is …

GUARDIA: specification and enforcement of javascript security policies without VM modifications

ALS Pupo, J Nicolay, EG Boix - … of the 15th International Conference on …, 2018 - dl.acm.org
The complex architecture of browser technologies and dynamic characteristics of JavaScript
make it difficult to ensure security in client-side web applications. Browser-level security …

It's More Than Stealing Cookies-Exploitability of XSS

K Nirmal, B Janet, R Kumar - 2018 Second International …, 2018 - ieeexplore.ieee.org
Web Application vulnerabilities are into existence since the beginning of the internet and the
world-wide web. In recent years, it has been given more importance considering the rapid …

[PDF][PDF] Attacking browser extensions

N Golubovic - Ruhr-Universitat Bochum, 2016 - golubovic.net
Browser extensions are extremely profitable targets for attackers due to their popularity and
privileges. This thesis examines both old and new attack techniques for Mozilla Firefox and …