Sciweavers

986 search results - page 7 / 198
» Protecting the Intranet Against
Sort
View
ESORICS
2011
Springer
12 years 7 months ago
Automatic and Precise Client-Side Protection against CSRF Attacks
A common client-side countermeasure against Cross Site Request Forgery (CSRF) is to strip session and authentication information from malicious requests. The difficulty however is ...
Philippe De Ryck, Lieven Desmet, Wouter Joosen, Fr...
TSE
2008
236views more  TSE 2008»
13 years 7 months ago
Provable Protection against Web Application Vulnerabilities Related to Session Data Dependencies
Web applications are widely adopted and their correct functioning is mission critical for many businesses. At the same time, Web applications tend to be error prone and implementat...
Lieven Desmet, Pierre Verbaeten, Wouter Joosen, Fr...
MR
2007
83views Robotics» more  MR 2007»
13 years 7 months ago
Active ESD protection circuit design against charged-device-model ESD event in CMOS integrated circuits
CDM ESD event has become the main ESD reliability concern for integrated-circuits products using nanoscale CMOS technology. A novel CDM ESD protection design, using self-biased cu...
Shih-Hung Chen, Ming-Dou Ker
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 2 months ago
Pushback for Overlay Networks: Protecting Against Malicious Insiders
Peer-to-Peer (P2P) overlay networks are a flexible way of creating decentralized services. Although resilient to external Denial of Service attacks, overlay networks can be render...
Angelos Stavrou, Michael E. Locasto, Angelos D. Ke...
DATE
2009
IEEE
135views Hardware» more  DATE 2009»
14 years 2 months ago
System-level hardware-based protection of memories against soft-errors
We present a hardware-based approach to improve the resilience of a computer system against the errors occurred in the main memory with the help of error detecting and correcting ...
Valentin Gherman, Samuel Evain, Mickael Cartron, N...