Sciweavers

739 search results - page 50 / 148
» Information Flow in Credential Systems
Sort
View
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
14 years 1 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
CCS
2007
ACM
14 years 1 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida
RAID
2010
Springer
13 years 5 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
SMALLTALK
2007
Springer
14 years 1 months ago
Object flow analysis: taking an object-centric view on dynamic analysis
To extract abstract views of the behavior of an object-oriented system for reverse engineering, a body of research exists that analyzes a system’s runtime execution. Those approa...
Adrian Lienhard, Stéphane Ducasse, Tudor G&...
CAISE
2009
Springer
14 years 2 months ago
Analysis and Validation of Control-Flow Complexity Measures with BPMN Process Models
Evaluating the complexity of business processes during the early stages of their development, primarily during the process modelling phase, provides organizations and stakeholder w...
Elvira Rolón Aguilar, Jorge Cardoso, F&eacu...