Sciweavers

867 search results - page 12 / 174
» Secure Input for Web Applications
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
A General Dynamic Information Flow Tracking Framework for Security Applications
Many software security solutions require accurate tracking of control/data dependencies among information objects in network applications. This paper presents a general dynamic in...
Lap-Chung Lam, Tzi-cker Chiueh
WWW
2010
ACM
14 years 2 months ago
Fine-grained privilege separation for web applications
We present a programming model for building web applications with security properties that can be confidently verified during a security review. In our model, applications are d...
Akshay Krishnamurthy, Adrian Mettler, David Wagner
ICWE
2004
Springer
14 years 1 months ago
Modeling User Input and Hypermedia Dynamics in Hera
Abstract. Methodologies for the engineering of Web applications typically provide models that drive the generation of the hypermedia navigation structure in the application. Most o...
Geert-Jan Houben, Flavius Frasincar, Peter Barna, ...
ICSE
2009
IEEE-ACM
14 years 2 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
CCS
2010
ACM
13 years 7 months ago
Symbolic security analysis of ruby-on-rails web applications
Many of today's web applications are built on frameworks that include sophisticated defenses against malicious adversaries. However, mistakes in the way developers deploy tho...
Avik Chaudhuri, Jeffrey S. Foster