Nome |
# |
Semantics-based analysis of content security policy deployment, file e4239ddc-a357-7180-e053-3705fe0a3322
|
623
|
Affine Refinement Types for Secure Distributed Programming, file e4239ddb-aad8-7180-e053-3705fe0a3322
|
368
|
Surviving the Web: A Journey into Web Session Security, file e4239ddc-3895-7180-e053-3705fe0a3322
|
292
|
Sub-session hijacking on the web: Root causes and prevention, file e4239ddd-20ec-7180-e053-3705fe0a3322
|
251
|
Sub-session hijacking on the web: Root causes and prevention, file e4239dde-0e34-7180-e053-3705fe0a3322
|
228
|
CookiExt: Patching the browser against session hijacking attacks, file e4239ddd-f61b-7180-e053-3705fe0a3322
|
227
|
Content Security Problems? Evaluating the Effectiveness of Content Security Policy in the Wild, file e4239ddc-38c1-7180-e053-3705fe0a3322
|
226
|
A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications, file e4239ddc-9560-7180-e053-3705fe0a3322
|
181
|
Formal methods for web security, file e4239ddc-3567-7180-e053-3705fe0a3322
|
177
|
Postcards from the post-HTTP world: Amplification of HTTPS vulnerabilities in the web ecosystem, file e4239ddd-1569-7180-e053-3705fe0a3322
|
175
|
Dr Cookie and Mr Token - Web session implementations and how to live with them, file e4239ddc-a356-7180-e053-3705fe0a3322
|
140
|
Reining in the Web's Inconsistencies with Site Policy, file e4239dde-5578-7180-e053-3705fe0a3322
|
98
|
Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies, file e4239dde-5292-7180-e053-3705fe0a3322
|
90
|
A hard lesson: Assessing the HTTPS deployment of Italian university websites, file e4239dde-3832-7180-e053-3705fe0a3322
|
72
|
A Supervised Learning Approach to Protect Client Authentication on the Web, file e4239ddd-f739-7180-e053-3705fe0a3322
|
63
|
Adversarial training of gradient-boosted decision trees, file e4239ddd-701f-7180-e053-3705fe0a3322
|
47
|
Fine-grained Detection of Privilege Escalation Attacks on Browser Extensions, file e4239dde-0d52-7180-e053-3705fe0a3322
|
38
|
Security protocol specification and verification with AnBx, file e4239dde-0ee0-7180-e053-3705fe0a3322
|
38
|
Measuring Web Session Security at Scale, file 8b87c535-3270-46c7-8433-6ce30dc21a61
|
32
|
Feature partitioning for robust tree ensembles and their certification in adversarial scenarios, file e4239dde-8e71-7180-e053-3705fe0a3322
|
26
|
CCSP: Controlled relaxation of content security policies by runtime policy composition, file e4239ddc-a359-7180-e053-3705fe0a3322
|
21
|
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring, file e4239ddc-dafe-7180-e053-3705fe0a3322
|
18
|
CCSP: Controlled relaxation of content security policies by runtime policy composition, file e4239dde-0360-7180-e053-3705fe0a3322
|
16
|
Treant: training evasion-aware decision trees, file f024f587-edb9-4807-a888-dd634a91bb26
|
13
|
Can i take your subdomain? Exploring same-site attacks in the modern web, file 579a5dcb-8c36-44ce-bea5-360e5f087b67
|
10
|
An Empirical Analysis of Web Storage and Its Applications to Web Tracking, file b0d39e92-7809-4d85-9c15-aa849161e228
|
7
|
The Security Lottery: Measuring Client-Side Web Security Inconsistencies, file b361db25-f2f3-4942-97d9-231b3016711f
|
7
|
A Supervised Learning Approach to Protect Client Authentication on the Web, file e4239ddb-9c78-7180-e053-3705fe0a3322
|
7
|
Surviving the Web: A Journey into Web Session Security, file e4239ddd-eb2c-7180-e053-3705fe0a3322
|
5
|
Verifiable Learning for Robust Tree Ensembles, file d7800a5f-39f5-4307-b979-0075b5ac32cc
|
4
|
Gran: model checking grsecurity RBAC policies, file e4239ddb-47ce-7180-e053-3705fe0a3322
|
4
|
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring, file e4239ddd-fb9c-7180-e053-3705fe0a3322
|
4
|
Provably Sound Browser-Based Enforcement of Web Session Integrity, file e4239ddb-6ea7-7180-e053-3705fe0a3322
|
3
|
Micro-Policies for Web Session Security, file e4239ddc-2f8d-7180-e053-3705fe0a3322
|
3
|
Lintent: Towards Security Type-Checking of Android Applications, file e4239ddb-3527-7180-e053-3705fe0a3322
|
2
|
Automatic and robust client-side protection for cookie-based sessions, file e4239ddb-3cf4-7180-e053-3705fe0a3322
|
2
|
Affine Refinement Types for Authentication and Authorization, file e4239ddb-43fd-7180-e053-3705fe0a3322
|
2
|
Resource-Aware Authorization Policies for Statically Typed Cryptographic Protocols, file e4239ddb-48c3-7180-e053-3705fe0a3322
|
2
|
Quite a mess in my cookie jar! Leveraging machine learning to protect web authentication, file e4239ddb-6dae-7180-e053-3705fe0a3322
|
2
|
A hard lesson: Assessing the HTTPS deployment of Italian university websites, file e4239ddd-b603-7180-e053-3705fe0a3322
|
2
|
Semantics-based analysis of content security policy deployment, file e4239ddd-eb34-7180-e053-3705fe0a3322
|
2
|
Formal methods for web security, file e4239ddd-f5a0-7180-e053-3705fe0a3322
|
2
|
Postcards from the post-HTTP world: Amplification of HTTPS vulnerabilities in the web ecosystem, file e4239ddd-f5f3-7180-e053-3705fe0a3322
|
2
|
CookiExt: Patching the browser against session hijacking attacks, file e4239dde-00db-7180-e053-3705fe0a3322
|
2
|
Logical Foundations of Secure Resource Management in Protocol Implementations, file e4239ddb-43fc-7180-e053-3705fe0a3322
|
1
|
Secrecy and Authenticity Types for Secure Distributed Messaging, file e4239ddb-5bcc-7180-e053-3705fe0a3322
|
1
|
Fine-grained Detection of Privilege Escalation Attacks on Browser Extensions, file e4239ddb-abdf-7180-e053-3705fe0a3322
|
1
|
Surviving the Web: A Journey into Web Session Security, file e4239ddd-b9ff-7180-e053-3705fe0a3322
|
1
|
Content Security Problems? Evaluating the Effectiveness of Content Security Policy in the Wild, file e4239ddd-eb24-7180-e053-3705fe0a3322
|
1
|
Totale |
3.539 |