Sciweavers

48 search results - page 4 / 10
» sec 2008
Sort
View
SEC
2008
14 years 8 days ago
Protecting Financial Institutions from Brute-Force Attacks
We examine the problem of protecting online banking accounts from password brute-forcing attacks. Our method is to create a large number of honeypot userID-password pairs. Presenta...
Cormac Herley, Dinei A. F. Florêncio
IPPS
2008
IEEE
14 years 5 months ago
Multi-threaded data mining of EDGAR CIKs (Central Index Keys) from ticker symbols
This paper describes how use the Java Swing HTMLEditorKit to perform multi-threaded web data mining on the EDGAR system (Electronic DataGathering, Analysis, and Retrieval system)....
Dougal A. Lyon
USS
2008
14 years 1 months ago
Engineering Heap Overflow Exploits with JavaScript
This paper presents a new technique for exploiting heap overflows in JavaScript interpreters. Briefly, given a heap overflow, JavaScript commands can be used to insure that a func...
Mark Daniel, Jake Honoroff, Charlie Miller
JOT
2008
142views more  JOT 2008»
13 years 10 months ago
Mining Edgar Tender Offers
This paper describes how use the HTMLEditorKit to perform web data mining on EDGAR (Electronic Data-Gathering, Analysis, and Retrieval system). EDGAR is the SEC's (U.S. Secur...
Douglas Lyon
SEC
2008
14 years 8 days ago
Software Licence Protection and Management for Organisations
Abstract Most organisations have recently converted their physical assets into digital forms. This underlines the needs to have different types of software products to manage such ...
Muntaha Alawneh, Imad M. Abbadi