Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-site Scripting Attacks
2024-1-4 10:8:38 Author: www.ndss-symposium.org(查看原文) 阅读量:5 收藏

Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense

Y. Nadji, Prateek Saxena and Dawn Song

Read More

An Efficient Black-box Technique for Defeating Web Application Attacks

R. Sekar

Read More

Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-site Scripting Attacks

M. Van Gundy and Hao Chen

Read More

The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties

P. Williams , R. Sion and D. Shasha

Read More

Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases

S. S. M. Chow, J. Lee and L. Subramanian

Read More

Sybillnfer: Detecting Sybil Nodes using Social Networks

G. Danezis and P. Mittal

Read More

Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic

Y. Song , A. Keromytis and S. Stolfo

Read More

Detecting Forged TCP Reset Packets

Nicholas Weaver, R. Sommer and Vern Paxson

Read More

Coordinated Scan Detection

C. Gates

Read More

RB-Seeker: Auto-detection of Redirection Botnets

X. Hu , M. Knysz and K. G. Shin

Read More

Scalable, Behavior-Based Malware Clustering

U. Bayer, P. Milani Comparetti, C. Hlauschek, Christopher Kruegel and Engin Kirda

Read More

K-Tracer: A System for Extracting Kernel Malware Behavior

A. Lanzi , M. Sharif and Wenke Lee

Read More

RAINBOW: A Robust and Invisible Non-Blind Watermark for Network Flows

Amir Houmansadr , N. Kiyavash and Nikita Borisov

Read More

Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis

C. Wright , Scott Coull and Fabian Monrose

Read More

Recursive DNS Architectures and Vulnerability Implications

D. Dagon , M. Antonakakis, K. Day, Xiapu Luo and Wenke Lee

Read More

Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems

Hong Chen, Ninghui Li and Ziqing Mao

Read More

IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution

Tielei Wang, T. Wei, Zhiqiang Lin and Wei Zou

Read More

Safe Passage for Passwords and Other Sensitive Data

Jonathan M. McCune, A. Perrig and Michael K. Reiter

Read More

Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication

C. Karlof, J. D. Tygar and David Wagner

Read More

CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable

Michael Backes, P. Druschel, A. Haeberlen and D. Unruh

Read More


文章来源: https://www.ndss-symposium.org/ndss2009/accepted-papers/#Noncespaces:%20Using%20Randomization%20to%20Enforce%20Information%20Flow%20Tracking%20and%20Thwart%20Cross-site%20Scripting%20Attacks
如有侵权请联系:admin#unsafe.sh