Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Fingerprinting the fingerprinters: Learning to detect browser fingerprinting behaviors
Browser fingerprinting is an invasive and opaque stateless tracking technique. Browser
vendors, academics, and standards bodies have long struggled to provide meaningful …
vendors, academics, and standards bodies have long struggled to provide meaningful …
{DONAPI}: Malicious {NPM} Packages Detector using Behavior Sequence Knowledge Map**
With the growing popularity of modularity in software development comes the rise of
package managers and language ecosystems. Among them, npm stands out as the most …
package managers and language ecosystems. Among them, npm stands out as the most …
Mining node. js vulnerabilities via object dependence graph and query
Node. js is a popular non-browser JavaScript platform that provides useful but sometimes
also vulnerable packages. On one hand, prior works have proposed many program analysis …
also vulnerable packages. On one hand, prior works have proposed many program analysis …
Detecting Node. js prototype pollution vulnerabilities via object lookup analysis
Prototype pollution is a type of vulnerability specific to prototype-based languages, such as
JavaScript, which allows an adversary to pollute a base object's property, leading to a further …
JavaScript, which allows an adversary to pollute a base object's property, leading to a further …
MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model
The widespread use of web applications has also made them more vulnerable to hackers,
resulting in the leakage of large amounts of application and personal privacy data. Cross …
resulting in the leakage of large amounts of application and personal privacy data. Cross …
Doublex: Statically detecting vulnerable data flows in browser extensions at scale
Browser extensions are popular to enhance users' browsing experience. By design, they
have access to security-and privacy-critical APIs to perform tasks that web applications …
have access to security-and privacy-critical APIs to perform tasks that web applications …
Scaling javascript abstract interpretation to detect and exploit node. js taint-style vulnerability
Taint-style vulnerabilities, such as OS command injection and path traversal, are common
and severe software weaknesses. There exists an inherent trade-off between analysis …
and severe software weaknesses. There exists an inherent trade-off between analysis …
Maltracker: A fine-grained npm malware tracker copiloted by llm-enhanced dataset
As the largest package registry, Node Package Manager (NPM) has become the prime
target for various supply chain attacks recently and has been flooded with numerous …
target for various supply chain attacks recently and has been flooded with numerous …
RuleKeeper: GDPR-aware personal data compliance for web frameworks
Pressured by existing regulations such as the EU GDPR, online services must advertise a
personal data protection policy declaring the types and purposes of collected personal data …
personal data protection policy declaring the types and purposes of collected personal data …
CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation
Extensions complement web browsers with additional functionalities and also bring new
vulnerability venues, allowing privilege escalations from adversarial web pages to use …
vulnerability venues, allowing privilege escalations from adversarial web pages to use …