A survey of man in the middle attacks
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer
security, representing one of the biggest concerns for security professionals. MITM targets …
security, representing one of the biggest concerns for security professionals. MITM targets …
Privacy in the smart city—applications, technologies, challenges, and solutions
Many modern cities strive to integrate information technology into every aspect of city life to
create so-called smart cities. Smart cities rely on a large number of application areas and …
create so-called smart cities. Smart cities rely on a large number of application areas and …
Stack overflow considered harmful? the impact of copy&paste on android application security
Online programming discussion platforms such as Stack Overflow serve as a rich source of
information for software developers. Available information include vibrant discussions and …
information for software developers. Available information include vibrant discussions and …
Towards secure and dependable software-defined networks
Software-defined networking empowers network operators with more flexibility to program
their networks. With SDN, network management moves from codifying functionality in terms …
their networks. With SDN, network management moves from codifying functionality in terms …
You get where you're looking for: The impact of information sources on code security
Vulnerabilities in Android code--including but not limited to insecure data storage,
unprotected inter-component communication, broken TLS implementations, and violations of …
unprotected inter-component communication, broken TLS implementations, and violations of …
[HTML][HTML] Rosmarinic acid and its derivatives: Current insights on anticancer potential and other biomedical applications
Cancer is still the leading cause of death worldwide, burdening the global medical system.
Rosmarinic acid (RA) is among the first secondary metabolites discovered and it is a …
Rosmarinic acid (RA) is among the first secondary metabolites discovered and it is a …
Comparing the usability of cryptographic apis
Potentially dangerous cryptography errors are well-documented in many applications.
Conventional wisdom suggests that many of these errors are caused by cryptographic …
Conventional wisdom suggests that many of these errors are caused by cryptographic …
50 ways to leak your data: An exploration of apps' circumvention of the android permissions system
Modern smartphone platforms implement permission-based models to protect access to
sensitive data and system resources. However, apps can circumvent the permission model …
sensitive data and system resources. However, apps can circumvent the permission model …
[PDF][PDF] A graduate course in applied cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …
Unikernels: Library operating systems for the cloud
We present unikernels, a new approach to deploying cloud services via applications written
in high-level source code. Unikernels are single-purpose appliances that are compile-time …
in high-level source code. Unikernels are single-purpose appliances that are compile-time …