The threat of offensive ai to organizations

Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei… - Computers & …, 2023 - Elsevier
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …

Cross-site scripting (XSS) attacks and mitigation: A survey

GE Rodríguez, JG Torres, P Flores, DE Benavides - Computer Networks, 2020 - Elsevier
The results of the Cisco 2018 Annual Security Report show that all analyzed web
applications have at least one vulnerability. It also shows that web attacks are becoming …

Automating cookie consent and {GDPR} violation detection

D Bollinger, K Kubicek, C Cotrini, D Basin - 31st USENIX Security …, 2022 - usenix.org
The European Union's General Data Protection Regulation (GDPR) requires websites to
inform users about personal data collection and request consent for cookies. Yet the majority …

Content security problems? evaluating the effectiveness of content security policy in the wild

S Calzavara, A Rabitti, M Bugliesi - Proceedings of the 2016 ACM …, 2016 - dl.acm.org
Content Security Policy (CSP) is an emerging W3C standard introduced to mitigate the
impact of content injection vulnerabilities on websites. We perform a systematic, large-scale …

Mitch: A machine learning approach to the black-box detection of CSRF vulnerabilities

S Calzavara, M Conti, R Focardi… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Cross-Site Request Forgery (CSRF) is one of the oldest and simplest attacks on the Web, yet
it is still effective on many websites and it can lead to severe consequences, such as …

Semantics-based analysis of content security policy deployment

S Calzavara, A Rabitti, M Bugliesi - ACM Transactions on the Web …, 2018 - dl.acm.org
Content Security Policy (CSP) is a recent W3C standard introduced to prevent and mitigate
the impact of content injection vulnerabilities on websites. In this article, we introduce a …

[HTML][HTML] Formal methods for web security

M Bugliesi, S Calzavara, R Focardi - … of Logical and Algebraic Methods in …, 2017 - Elsevier
In the last few years, many security researchers proposed to endow the web platform with
more rigorous foundations, thus allowing for a precise reasoning on web security issues …

Postcards from the post-http world: Amplification of https vulnerabilities in the web ecosystem

S Calzavara, R Focardi, M Nemec… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
HTTPS aims at securing communication over the Web by providing a cryptographic
protection layer that ensures the confidentiality and integrity of communication and enables …

A longitudinal study on web-sites password management (in) security: Evidence and remedies

S Raponi, R Di Pietro - IEEE Access, 2020 - ieeexplore.ieee.org
Single-factor password-based authentication is generally the norm to access on-line Web-
sites. While single-factor authentication is well known to be a weak form of authentication, a …

Machine learning for web vulnerability detection: the case of cross-site request forgery

S Calzavara, M Conti, R Focardi, A Rabitti… - IEEE Security & …, 2020 - ieeexplore.ieee.org
We propose a methodology to leverage machine learning (ML) for the detection of web
application vulnerabilities. We use it in the design of Mitch, the first ML solution for the black …