Securing web applications from injection and logic vulnerabilities: Approaches and challenges
Context: Web applications are trusted by billions of users for performing day-to-day activities.
Accessibility, availability and omnipresence of web applications have made them a prime …
Accessibility, availability and omnipresence of web applications have made them a prime …
Mitigating program security vulnerabilities: Approaches and challenges
Programs are implemented in a variety of languages and contain serious vulnerabilities
which might be exploited to cause security breaches. These vulnerabilities have been …
which might be exploited to cause security breaches. These vulnerabilities have been …
Clonecloud: elastic execution between mobile device and cloud
Mobile applications are becoming increasingly ubiquitous and provide ever richer
functionality on mobile devices. At the same time, such devices often enjoy strong …
functionality on mobile devices. At the same time, such devices often enjoy strong …
[PDF][PDF] Airavat: Security and privacy for MapReduce.
Airavat: Security and Privacy for MapReduce Page 1 Airavat: Security and Privacy for
MapReduce Indrajit Roy, Srinath TV Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The …
MapReduce Indrajit Roy, Srinath TV Setty, Ann Kilzer, Vitaly Shmatikov, Emmett Witchel The …
Using ARM TrustZone to build a trusted language runtime for mobile applications
This paper presents the design, implementation, and evaluation of the Trusted Language
Runtime (TLR), a system that protects the confidentiality and integrity of. NET mobile …
Runtime (TLR), a system that protects the confidentiality and integrity of. NET mobile …
Merlin: A language for provisioning network resources
This paper presents Merlin, a new framework for managing resources in software-defined
networks. With Merlin, administrators express high-level policies using programs in a …
networks. With Merlin, administrators express high-level policies using programs in a …
NOYB: Privacy in online social networks
S Guha, K Tang, P Francis - Proceedings of the first workshop on Online …, 2008 - dl.acm.org
Increasingly, Internet users trade privacy for service. Facebook, Google, and others mine
personal information to target advertising. This paper presents a preliminary and partial …
personal information to target advertising. This paper presents a preliminary and partial …
Sedic: privacy-aware data intensive computing on hybrid clouds
The emergence of cost-effective cloud services offers organizations great opportunity to
reduce their cost and increase productivity. This development, however, is hampered by …
reduce their cost and increase productivity. This development, however, is hampered by …
Dynamic vs. static flow-sensitive security analysis
This paper seeks to answer fundamental questions about trade-offs between static and
dynamic security analysis. It has been previously shown that flow-sensitive static information …
dynamic security analysis. It has been previously shown that flow-sensitive static information …
Staged information flow for JavaScript
Modern websites are powered by JavaScript, a flexible dynamic scripting language that
executes in client browsers. A common paradigm in such websites is to include third-party …
executes in client browsers. A common paradigm in such websites is to include third-party …