Sciweavers

867 search results - page 20 / 174
» Secure Input for Web Applications
Sort
View
ESSOS
2010
Springer
14 years 2 months ago
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks
Completely handling SQL injection consists of two activities: properly protecting the system from malicious input, and preventing any resultant error messages caused by SQL injecti...
Ben H. Smith, Laurie Williams, Andrew Austin
CSFW
2010
IEEE
13 years 11 months ago
Towards a Formal Foundation of Web Security
—We propose a formal model of web security based straction of the web platform and use this model to analyze the security of several sample web mechanisms and applications. We id...
Devdatta Akhawe, Adam Barth, Peifung E. Lam, John ...
CRYPTO
2007
Springer
116views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
Random Oracles and Auxiliary Input
We introduce a variant of the random oracle model where oracle-dependent auxiliary input is allowed. In this setting, the adversary gets an auxiliary input that can contain informa...
Dominique Unruh
SIGMOD
2006
ACM
113views Database» more  SIGMOD 2006»
14 years 7 months ago
A system for specification and verification of interactive, data-driven web applications
In recent research, we have proposed a framework for highlevel specification of interactive, data-driven Web applications and established theoretical foundations for their verific...
Alin Deutsch, Liying Sui, Victor Vianu, Dayou Zhou
OTM
2007
Springer
14 years 1 months ago
Prevention of Cross-Site Scripting Attacks on Current Web Applications
Security is becoming one of the major concerns for web applications and other Internet based services, which are becoming pervasive in all kinds of business models and organization...
Joaquín García-Alfaro, Guillermo Nav...