Ten years of rich internet applications: A systematic map** study, and beyond

S Casteleyn, I Garrig'os, JN Maz'on - ACM Transactions on the Web …, 2014 - dl.acm.org
BACKGROUND. The term Rich Internet Applications (RIAs) is generally associated with
Web applications that provide the features and functionality of traditional desktop …

Analysis of SQL injection detection techniques

JP Singh - arxiv preprint arxiv:1605.02796, 2016 - arxiv.org
SQL Injection is one of the vulnerabilities in OWASPs Top Ten List for Web Based
Application Exploitation. These types of attacks takes place on Dynamic Web applications as …

Measuring login webpage security

S Van Acker, D Hausknecht, A Sabelfeld - Proceedings of the …, 2017 - dl.acm.org
Login webpages are the entry points into sensitive parts of web applications, dividing
between public access to a website and private, user-specific, access to the website …

FlashOver: Automated discovery of cross-site scripting vulnerabilities in rich internet applications

S Van Acker, N Nikiforakis, L Desmet… - Proceedings of the 7th …, 2012 - dl.acm.org
The last fifteen years have transformed the Web in ways that would seem unimaginable to
anyone of the" few" Internet users of the year 1995 [8]. What began as a simple set of …

The privacy flag observatory: A crowdsourcing tool for real time privacy threats evaluation

V Vlachos, YC Stamatiou, S Nikoletseas - Journal of Cybersecurity and …, 2023 - mdpi.com
Instilling good privacy practices to developers and users appears to be a difficult and
daunting task. The World Wide Web encompasses a panspermia of different technologies …

A detailed evaluation of sql injection attacks, detection and prevention techniques

N Joshi, T Sheth, V Shah, J Gupta… - 2022 5th International …, 2022 - ieeexplore.ieee.org
An SQL Injection attack is a database focused attack for programmes that utilise data. It is
accomplished by inserting malicious lines of code into the SQL queryto alter and modify its …

Understanding the Country-Level Security of Free Content Websites and their Hosting Infrastructure

M Alqadhi, A Alkinoon, S Salem… - 2023 IEEE 10th …, 2023 - ieeexplore.ieee.org
This paper examines free content websites (FCWs) and premium content websites (PCWs)
in different countries, comparing them to general websites. The focus is on the distribution of …

Entangled Clouds: Measuring the Hosting Infrastructure of the Free Contents Web

M Alqadhi, M Alkinoon, J Lin, A Abdalaal… - Proceedings of the …, 2023 - dl.acm.org
Free content websites (FCWs) are a critical part of the Internet, and understanding them is
essential for their wide use. This study statistically explores the distribution of free content …

[PDF][PDF] The state of the cross-domain nation

S Lekies, M Johns, W Tighzert - … of the 5th Workshop on Web, 2011 - ieee-security.org
The State of the Cross-domain Nation Page 1 CONFIDENTIAL The State of the Cross-domain
Nation Sebastian Lekies, Martin Johns and Walter Tighzert W2SP / May 26th 2011 Page 2 © …

[PDF][PDF] Analyzing the crossdomain policies of Flash applications

D Jang, A Venkataraman, GM Sawka… - Proceedings of the 5th …, 2011 - hovav.net
Adobe Flash is a rich Internet application platform. Flash applications are often deployed to
the Web; The Flash Player plugin is installed on a large fraction of all Webconnected PCs …