The threat of offensive ai to organizations
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …
data, and synthesize media that is nearly indistinguishable from the real thing. However …
Cross-site scripting (XSS) attacks and mitigation: A survey
The results of the Cisco 2018 Annual Security Report show that all analyzed web
applications have at least one vulnerability. It also shows that web attacks are becoming …
applications have at least one vulnerability. It also shows that web attacks are becoming …
Automating cookie consent and {GDPR} violation detection
The European Union's General Data Protection Regulation (GDPR) requires websites to
inform users about personal data collection and request consent for cookies. Yet the majority …
inform users about personal data collection and request consent for cookies. Yet the majority …
Content security problems? evaluating the effectiveness of content security policy in the wild
Content Security Policy (CSP) is an emerging W3C standard introduced to mitigate the
impact of content injection vulnerabilities on websites. We perform a systematic, large-scale …
impact of content injection vulnerabilities on websites. We perform a systematic, large-scale …
Mitch: A machine learning approach to the black-box detection of CSRF vulnerabilities
Cross-Site Request Forgery (CSRF) is one of the oldest and simplest attacks on the Web, yet
it is still effective on many websites and it can lead to severe consequences, such as …
it is still effective on many websites and it can lead to severe consequences, such as …
Semantics-based analysis of content security policy deployment
Content Security Policy (CSP) is a recent W3C standard introduced to prevent and mitigate
the impact of content injection vulnerabilities on websites. In this article, we introduce a …
the impact of content injection vulnerabilities on websites. In this article, we introduce a …
[HTML][HTML] Formal methods for web security
In the last few years, many security researchers proposed to endow the web platform with
more rigorous foundations, thus allowing for a precise reasoning on web security issues …
more rigorous foundations, thus allowing for a precise reasoning on web security issues …
Postcards from the post-http world: Amplification of https vulnerabilities in the web ecosystem
HTTPS aims at securing communication over the Web by providing a cryptographic
protection layer that ensures the confidentiality and integrity of communication and enables …
protection layer that ensures the confidentiality and integrity of communication and enables …
A longitudinal study on web-sites password management (in) security: Evidence and remedies
S Raponi, R Di Pietro - IEEE Access, 2020 - ieeexplore.ieee.org
Single-factor password-based authentication is generally the norm to access on-line Web-
sites. While single-factor authentication is well known to be a weak form of authentication, a …
sites. While single-factor authentication is well known to be a weak form of authentication, a …
Machine learning for web vulnerability detection: the case of cross-site request forgery
We propose a methodology to leverage machine learning (ML) for the detection of web
application vulnerabilities. We use it in the design of Mitch, the first ML solution for the black …
application vulnerabilities. We use it in the design of Mitch, the first ML solution for the black …