Surviving the web: A journey into web session security
In this article, we survey the most common attacks against web sessions, that is, attacks that
target honest web browser users establishing an authenticated session with a trusted web …
target honest web browser users establishing an authenticated session with a trusted web …
A survey of challenges for runtime verification from advanced application domains (beyond software)
Runtime verification is an area of formal methods that studies the dynamic analysis of
execution traces against formal specifications. Typically, the two main activities in runtime …
execution traces against formal specifications. Typically, the two main activities in runtime …
The web sso standard openid connect: In-depth formal security analysis and security guidelines
Web-based single sign-on (SSO) services such as Google Sign-In and Log In with Paypal
are based on the OpenID Connect protocol. This protocol enables so-called relying parties …
are based on the OpenID Connect protocol. This protocol enables so-called relying parties …
Containing malicious package updates in npm with a lightweight permission system
The large amount of third-party packages available in fast-moving software ecosystems,
such as Node. js/npm, enables attackers to compromise applications by pushing malicious …
such as Node. js/npm, enables attackers to compromise applications by pushing malicious …
Mystique: Uncovering information leakage from browser extensions
Browser extensions are small JavaScript, CSS and HTML programs that run inside the
browser with special privileges. These programs, often written by third parties, operate on …
browser with special privileges. These programs, often written by third parties, operate on …
[PDF][PDF] Collaboro: a collaborative (meta) modeling tool
Motivation Scientists increasingly rely on intelligent information systems to help them in their
daily tasks, in particular for managing research objects, like publications or datasets. The …
daily tasks, in particular for managing research objects, like publications or datasets. The …
User-controlled privacy: taint, track, and control
We develop the first language-based, Privacy by Design approach that provides support for
a rich class of privacy policies. The policies are user-defined, rather than programmer …
a rich class of privacy policies. The policies are user-defined, rather than programmer …
Discovering browser extensions via web accessible resources
Browser extensions provide a powerful platform to enrich browsing experience. At the same
time, they raise important security questions. From the point of view of a website, some …
time, they raise important security questions. From the point of view of a website, some …
Defending against web application attacks: Approaches, challenges and implications
D Mitropoulos, P Louridas… - … on Dependable and …, 2017 - ieeexplore.ieee.org
Some of the most dangerous web attacks, such as Cross-Site Scripting and sql injection,
exploit vulnerabilities in web applications that may accept and process data of uncertain …
exploit vulnerabilities in web applications that may accept and process data of uncertain …
Practical {DIFC} Enforcement on Android
Smartphone users often use private and enterprise data with untrusted third party
applications. The fundamental lack of secrecy guarantees in smartphone OSes, such as …
applications. The fundamental lack of secrecy guarantees in smartphone OSes, such as …