Výsledky vyhľadávania - "JavaScript attack"

  1. 1

    Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector Autor Bosman, Erik, Razavi, Kaveh, Bos, Herbert, Giuffrida, Cristiano

    ISSN: 2375-1207
    Vydavateľské údaje: IEEE 01.05.2016
    “…Memory deduplication, a well-known technique to reduce the memory footprint across virtual machines, is now also a default-on feature inside the Windows 8.1…”
    Získať plný text
    Konferenčný príspevok.. Journal Article
  2. 2

    TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript Autor Mehrnezhad, Maryam, Toreini, Ehsan, Shahandashti, Siamak F., Hao, Feng

    ISSN: 2214-2126
    Vydavateľské údaje: Elsevier Ltd 01.02.2016
    “…Conforming to W3C specifications, mobile web browsers allow JavaScript code in a web page to access motion and orientation sensor data without the user's…”
    Získať plný text
    Journal Article
  3. 3

    Stealing PINs via mobile sensors: actual risk versus user perception Autor Mehrnezhad, Maryam, Toreini, Ehsan, Shahandashti, Siamak F., Hao, Feng

    ISSN: 1615-5262, 1615-5270, 1615-5270
    Vydavateľské údaje: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2018
    “…In this paper, we present the actual risks of stealing user PINs by using mobile sensors versus the perceived risks by users. First, we propose PINlogger.js…”
    Získať plný text
    Journal Article
  4. 4

    Rowhammer: New JavaScript Attack That Targets DRAM

    Vydavateľské údaje: Tehran Disco Digital Media, Inc 05.08.2015
    Vydané v FARS News Agency (05.08.2015)
    Získať plný text
    Newsletter
  5. 5

    Protection Mechanism in JavaScript Attacks Autor Wu, Min-Hao, Chiu, Chen-Yu, Huang, Jian-Hung, Chen, Jian-Xin, Wang, Hao-Jyun, Lin, Ying

    Vydavateľské údaje: IEEE 03.02.2023
    “…Web pages are increasing due to the rapid development of information technology. Many tasks were previously only possible by installing software on the…”
    Získať plný text
    Konferenčný príspevok..
  6. 6

    Taxonomy for Javascript attacks Autor Nourijelyani, Mohammad Hassan

    ISBN: 1369112548, 9781369112542
    Vydavateľské údaje: ProQuest Dissertations & Theses 01.01.2014
    “… To identify the context in which JavaScript attacks take place, we discuss different styles of software architecture and conclude that the architecture relevant to our study is client…”
    Získať plný text
    Dissertation
  7. 7

    A Systematic Literature Review and Quality Analysis of Javascript Malware Detection Autor Sohan, Md. Fahimuzzman, Basalamah, Anas

    ISSN: 2169-3536, 2169-3536
    Vydavateľské údaje: Piscataway IEEE 2020
    Vydané v IEEE access (2020)
    “…Context: JavaScript (JS) is an often-used programming language by millions of web pages and is also affected by thousands of malicious attacks. Objective: In…”
    Získať plný text
    Journal Article
  8. 8

    How to Identify JavaScript Attacks

    Vydavateľské údaje: Washington, D.C Targeted News Service 30.11.2016
    Vydané v Targeted News Service (30.11.2016)
    Získať plný text
    Newsletter
  9. 9

    A NOVEL FRAMEWORK TO ALLEVIATE DISSEMINATION OF XSS WORMS IN ONLINE SOCIAL NETWORK (OSN) USING VIEW SEGREGATION Autor Chaudhary, Pooja, Gupta, B. B.

    ISSN: 1210-0552, 2336-4335
    Vydavateľské údaje: Prague Institute of Information and Computer Technology 01.01.2017
    Vydané v Neural Network World (01.01.2017)
    “…). Secondly, JavaScript attack vectors are retrieved from the HTTP response by referring the blacklist repository of attack vectors…”
    Získať plný text
    Journal Article
  10. 10
  11. 11
  12. 12

    Researcher: JavaScript Attacks Get Slicker

    ISSN: 1530-6283
    Vydavateľské údaje: QuinStreet Enterprise 18.04.2007
    Vydané v eWeek (New York, N.Y.) (18.04.2007)
    Získať plný text
    Magazine Article
  13. 13

    Fortinet June Threat Landscape report shows new variations of Sasfis Botnet, Obfuscated JavaScript attacks

    Vydavateľské údaje: Dubai Mediaquest Corp 04.07.2010
    Vydané v Middle East Company News (04.07.2010)
    “…  Fortinet (NASDAQ: FTNT) is a worldwide provider of network security appliances and the market leader in unified threat management (UTM). Our products and…”
    Získať plný text
    Newspaper Article
  14. 14

    SFC: A Three Layer Smart Phone-Fag-Cloud Framework for Defending Against JavaScript Code Injection Vulnerabilities on OSN Autor Gupta, Shashank, Gugta, B. B.

    Vydavateľské údaje: IEEE 01.01.2018
    “…). Such offline CDC statically computes the features of clustered-sanitized compressed patterns of JavaScript attack vectors embedded in the HTTP response messages and inject them on the online edge…”
    Získať plný text
    Konferenčný príspevok..
  15. 15

    Remote Scheduler Contention Attacks Autor Gast, Stefan, Juffinger, Jonas, Maar, Lukas, Royer, Christoph, Kogler, Andreas, Gruss, Daniel

    ISSN: 2331-8422
    Vydavateľské údaje: Ithaca Cornell University Library, arXiv.org 10.04.2024
    Vydané v arXiv.org (10.04.2024)
    “… % and a standard deviation below 4 ms from the ground truth. Our end-to-end JavaScript attack transmits across Firefox instances, bypassing cross-origin policies and site…”
    Získať plný text
    Paper
  16. 16

    MAC OS X FORENSICS: PASSWORD DISCOVERY1 Autor Primeaux, David, Dahlberg, Robert, Keo, Kamnab, Larson, Stephen, Pennell, B, Sherman, K

    ISSN: 1931-7379, 1931-7387
    Vydavateľské údaje: Maidens Association of Digital Forensics, Security and Law 01.01.2011
    “…OS X provides a password-rich environment in which passwords protect OS X resources and perhaps many other resources accessed through OS X. Every password an…”
    Získať plný text
    Journal Article
  17. 17

    Alleviating the proliferation of JavaScript worms from online social network in cloud platforms Autor Gupta, Shashank, Gupta, B. B.

    Vydavateľské údaje: IEEE 01.04.2016
    “… In addition, it also detects the partial JavaScript injection by the attacker and performs the sanitization on the detected JavaScript attack vectors in a context-aware manner…”
    Získať plný text
    Konferenčný príspevok..
  18. 18

    Robust Website Fingerprinting Through the Cache Occupancy Channel Autor Shusterman, Anatoly, Kang, Lachlan, Yarden Haskal, Meltser, Yosef, Mittal, Prateek, Oren, Yossi, Yarom, Yuval

    ISSN: 2331-8422
    Vydavateľské údaje: Ithaca Cornell University Library, arXiv.org 21.02.2019
    Vydané v arXiv.org (21.02.2019)
    “…Website fingerprinting attacks, which use statistical analysis on network traffic to compromise user privacy, have been shown to be effective even if the…”
    Získať plný text
    Paper
  19. 19

    Teen arrested for sharing exploit that almost brought down 911 Autor Fingas, Jon

    Vydavateľské údaje: New York Apollo Global Managment 30.10.2016
    Vydané v Engadget (30.10.2016)
    “… Phoenix police have arrested 18-year-old Meetkumar Hitesbhai Desai on computer tampering charges after he publicly posted a version of iOS-based JavaScript attack that he thought would only deliver…”
    Získať plný text
    Newspaper Article
  20. 20

    Analysis of Russian Apps for TSPU-Related Risks Autor Konyukhov, Vitaliy

    ISBN: 9798382325354
    Vydavateľské údaje: ProQuest Dissertations & Theses 01.01.2024
    “… This thesis investigates the potential risks associated with these developments, focusing on the vulnerability of Russian Android applications to targeted JavaScript attacks compromising the privacy…”
    Získať plný text
    Dissertation