Surviving the web: A journey into web session security

S Calzavara, R Focardi, M Squarcina… - ACM Computing Surveys …, 2017 - dl.acm.org
In this article, we survey the most common attacks against web sessions, that is, attacks that
target honest web browser users establishing an authenticated session with a trusted web …

A survey of challenges for runtime verification from advanced application domains (beyond software)

C Sánchez, G Schneider, W Ahrendt, E Bartocci… - Formal Methods in …, 2019 - Springer
Runtime verification is an area of formal methods that studies the dynamic analysis of
execution traces against formal specifications. Typically, the two main activities in runtime …

The web sso standard openid connect: In-depth formal security analysis and security guidelines

D Fett, R Küsters, G Schmitz - 2017 IEEE 30th Computer …, 2017 - ieeexplore.ieee.org
Web-based single sign-on (SSO) services such as Google Sign-In and Log In with Paypal
are based on the OpenID Connect protocol. This protocol enables so-called relying parties …

Containing malicious package updates in npm with a lightweight permission system

G Ferreira, L Jia, J Sunshine… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
The large amount of third-party packages available in fast-moving software ecosystems,
such as Node. js/npm, enables attackers to compromise applications by pushing malicious …

Mystique: Uncovering information leakage from browser extensions

Q Chen, A Kapravelos - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
Browser extensions are small JavaScript, CSS and HTML programs that run inside the
browser with special privileges. These programs, often written by third parties, operate on …

[PDF][PDF] Collaboro: a collaborative (meta) modeling tool

JLC Izquierdo, J Cabot - PeerJ Computer Science, 2016 - peerj.com
Motivation Scientists increasingly rely on intelligent information systems to help them in their
daily tasks, in particular for managing research objects, like publications or datasets. The …

User-controlled privacy: taint, track, and control

F Hublet, D Basin, S Krstić - Proceedings on Privacy Enhancing …, 2024 - petsymposium.org
We develop the first language-based, Privacy by Design approach that provides support for
a rich class of privacy policies. The policies are user-defined, rather than programmer …

Discovering browser extensions via web accessible resources

A Sjösten, S Van Acker, A Sabelfeld - … ACM on Conference on Data and …, 2017 - dl.acm.org
Browser extensions provide a powerful platform to enrich browsing experience. At the same
time, they raise important security questions. From the point of view of a website, some …

Defending against web application attacks: Approaches, challenges and implications

D Mitropoulos, P Louridas… - … on Dependable and …, 2017 - ieeexplore.ieee.org
Some of the most dangerous web attacks, such as Cross-Site Scripting and sql injection,
exploit vulnerabilities in web applications that may accept and process data of uncertain …

Practical {DIFC} Enforcement on Android

A Nadkarni, B Andow, W Enck, S Jha - 25th USENIX Security …, 2016 - usenix.org
Smartphone users often use private and enterprise data with untrusted third party
applications. The fundamental lack of secrecy guarantees in smartphone OSes, such as …