Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The {Emperor's} new password manager: Security analysis of web-based password managers
We conduct a security analysis of five popular web-based password managers. Unlike
“local” password managers, web-based password managers run in the browser. We identify …
“local” password managers, web-based password managers run in the browser. We identify …
Building web applications on top of encrypted data using Mylar
Web applications rely on servers to store and process confidential information. However,
anyone who gains access to the server (eg, an attacker, a curious administrator, or a …
anyone who gains access to the server (eg, an attacker, a curious administrator, or a …
Breaking web applications built on top of encrypted data
We develop a systematic approach for analyzing client-server applications that aim to hide
sensitive user data from untrusted servers. We then apply it to Mylar, a framework that uses …
sensitive user data from untrusted servers. We then apply it to Mylar, a framework that uses …
Preventing dynamic library compromise on node. js via rwx-based privilege reduction
Third-party libraries ease the development of large-scale software systems. However,
libraries often execute with significantly more privilege than needed to complete their task …
libraries often execute with significantly more privilege than needed to complete their task …
Automated partitioning of android applications for trusted execution environments
K Rubinov, L Rosculete, T Mitra… - Proceedings of the 38th …, 2016 - dl.acm.org
The co-existence of critical and non-critical applications on computing devices, such as
mobile phones, is becoming commonplace. The sensitive segments of a critical application …
mobile phones, is becoming commonplace. The sensitive segments of a critical application …
[PDF][PDF] The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites.
The postMessage mechanism in HTML5 enables Web content from different origins to
communicate with each other, thus relaxing the same origin policy. It is especially popular in …
communicate with each other, thus relaxing the same origin policy. It is especially popular in …
Gradual ty** embedded securely in JavaScript
JavaScript's flexible semantics makes writing correct code hard and writing secure code
extremely difficult. To address the former problem, various forms of gradual ty** have …
extremely difficult. To address the former problem, various forms of gradual ty** have …
deDacota: toward preventing server-side XSS via automatic code and data separation
A Doupe, W Cui, MH Jakubowski, M Peinado… - Proceedings of the …, 2013 - dl.acm.org
Web applications are constantly under attack. They are popular, typically accessible from
anywhere on the Internet, and they can be abused as malware delivery systems. Cross-site …
anywhere on the Internet, and they can be abused as malware delivery systems. Cross-site …
Fine-grained access control for html5-based mobile applications in android
HTML5-based mobile applications are becoming more and more popular because they can
run on different platforms. Several newly introduced mobile OS natively support HTML5 …
run on different platforms. Several newly introduced mobile OS natively support HTML5 …
Language-based defenses against untrusted browser origins
We present new attacks and robust countermeasures for security-sensitive components,
such as single sign-on APIs and client-side cryptographic libraries, that need to be safely …
such as single sign-on APIs and client-side cryptographic libraries, that need to be safely …