Sciweavers

776 search results - page 118 / 156
» Securing user inputs for the web
Sort
View
USS
2008
13 years 11 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
MIRAGE
2007
Springer
14 years 3 months ago
Copying Behaviour of Expressive Motion
Abstract. In this paper we present an agent that can analyse certain human fullbody movements in order to respond in an expressive manner with copying behaviour. Our work focuses o...
Maurizio Mancini, Ginevra Castellano, Elisabetta B...
DKE
2007
130views more  DKE 2007»
13 years 8 months ago
Enabling access-privacy for random walk based data analysis applications
Random walk graph and Markov chain based models are used heavily in many data and system analysis domains, including web, bioinformatics, and queuing. These models enable the desc...
Ping Lin, K. Selçuk Candan
SOUPS
2006
ACM
14 years 2 months ago
Power strips, prophylactics, and privacy, oh my!
While Internet users claim to be concerned about online privacy, their behavior rarely reflects those concerns. In this paper we investigate whether the availability of compariso...
Julia Gideon, Lorrie Faith Cranor, Serge Egelman, ...
PET
2010
Springer
14 years 23 days ago
Making a Nymbler Nymble Using VERBS
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, T...
Ryan Henry, Kevin Henry, Ian Goldberg