Výsledky vyhľadávania - "JavaScript attack"
-
1
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector
ISSN: 2375-1207Vydavateľské údaje: IEEE 01.05.2016Vydané v Proceedings - IEEE Symposium on Security and Privacy (01.05.2016)“…Memory deduplication, a well-known technique to reduce the memory footprint across virtual machines, is now also a default-on feature inside the Windows 8.1…”
Získať plný text
Konferenčný príspevok.. Journal Article -
2
TouchSignatures: Identification of user touch actions and PINs based on mobile sensor data via JavaScript
ISSN: 2214-2126Vydavateľské údaje: Elsevier Ltd 01.02.2016Vydané v Journal of information security and applications (01.02.2016)“…Conforming to W3C specifications, mobile web browsers allow JavaScript code in a web page to access motion and orientation sensor data without the user's…”
Získať plný text
Journal Article -
3
Stealing PINs via mobile sensors: actual risk versus user perception
ISSN: 1615-5262, 1615-5270, 1615-5270Vydavateľské údaje: Berlin/Heidelberg Springer Berlin Heidelberg 01.06.2018Vydané v International journal of information security (01.06.2018)“…In this paper, we present the actual risks of stealing user PINs by using mobile sensors versus the perceived risks by users. First, we propose PINlogger.js…”
Získať plný text
Journal Article -
4
Rowhammer: New JavaScript Attack That Targets DRAM
Vydavateľské údaje: Tehran Disco Digital Media, Inc 05.08.2015Vydané v FARS News Agency (05.08.2015)Získať plný text
Newsletter -
5
Protection Mechanism in JavaScript Attacks
Vydavateľské údaje: IEEE 03.02.2023Vydané v 2023 IEEE 6th Eurasian Conference on Educational Innovation (ECEI) (03.02.2023)“…Web pages are increasing due to the rapid development of information technology. Many tasks were previously only possible by installing software on the…”
Získať plný text
Konferenčný príspevok.. -
6
Taxonomy for Javascript attacks
ISBN: 1369112548, 9781369112542Vydavateľské údaje: ProQuest Dissertations & Theses 01.01.2014“… To identify the context in which JavaScript attacks take place, we discuss different styles of software architecture and conclude that the architecture relevant to our study is client…”
Získať plný text
Dissertation -
7
A Systematic Literature Review and Quality Analysis of Javascript Malware Detection
ISSN: 2169-3536, 2169-3536Vydavateľské údaje: Piscataway IEEE 2020Vydané v IEEE access (2020)“…Context: JavaScript (JS) is an often-used programming language by millions of web pages and is also affected by thousands of malicious attacks. Objective: In…”
Získať plný text
Journal Article -
8
How to Identify JavaScript Attacks
Vydavateľské údaje: Washington, D.C Targeted News Service 30.11.2016Vydané v Targeted News Service (30.11.2016)Získať plný text
Newsletter -
9
A NOVEL FRAMEWORK TO ALLEVIATE DISSEMINATION OF XSS WORMS IN ONLINE SOCIAL NETWORK (OSN) USING VIEW SEGREGATION
ISSN: 1210-0552, 2336-4335Vydavateľské údaje: Prague Institute of Information and Computer Technology 01.01.2017Vydané v Neural Network World (01.01.2017)“…). Secondly, JavaScript attack vectors are retrieved from the HTTP response by referring the blacklist repository of attack vectors…”
Získať plný text
Journal Article -
10
PRESS RELEASE: Fortinet June Threat Landscape Report Shows New Variations of Sasfis Botnet, Obfuscated JavaScript Attacks
Vydavateľské údaje: New York Dow Jones & Company Inc 30.06.2010Vydané v Dow Jones Institutional News (30.06.2010)Získať plný text
Newsletter -
11
Researcher: JavaScript Attacks Get Slicker; An Arbor Networks researcher at CanSecWest details JavaScript exploits' increasingly sophisticated means of attack and what tools to use to fight them
ISSN: 1530-6283Vydavateľské údaje: New York Quinstreet 18.04.2007Vydané v eWeek (18.04.2007)Získať plný text
Trade Publication Article -
12
Researcher: JavaScript Attacks Get Slicker
ISSN: 1530-6283Vydavateľské údaje: QuinStreet Enterprise 18.04.2007Vydané v eWeek (New York, N.Y.) (18.04.2007)Získať plný text
Magazine Article -
13
Fortinet June Threat Landscape report shows new variations of Sasfis Botnet, Obfuscated JavaScript attacks
Vydavateľské údaje: Dubai Mediaquest Corp 04.07.2010Vydané v Middle East Company News (04.07.2010)“… Fortinet (NASDAQ: FTNT) is a worldwide provider of network security appliances and the market leader in unified threat management (UTM). Our products and…”
Získať plný text
Newspaper Article -
14
SFC: A Three Layer Smart Phone-Fag-Cloud Framework for Defending Against JavaScript Code Injection Vulnerabilities on OSN
Vydavateľské údaje: IEEE 01.01.2018Vydané v 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (01.01.2018)“…). Such offline CDC statically computes the features of clustered-sanitized compressed patterns of JavaScript attack vectors embedded in the HTTP response messages and inject them on the online edge…”
Získať plný text
Konferenčný príspevok.. -
15
Remote Scheduler Contention Attacks
ISSN: 2331-8422Vydavateľské údaje: Ithaca Cornell University Library, arXiv.org 10.04.2024Vydané v arXiv.org (10.04.2024)“… % and a standard deviation below 4 ms from the ground truth. Our end-to-end JavaScript attack transmits across Firefox instances, bypassing cross-origin policies and site…”
Získať plný text
Paper -
16
MAC OS X FORENSICS: PASSWORD DISCOVERY1
ISSN: 1931-7379, 1931-7387Vydavateľské údaje: Maidens Association of Digital Forensics, Security and Law 01.01.2011Vydané v Proceedings of the Conference on Digital Forensics, Security and Law (01.01.2011)“…OS X provides a password-rich environment in which passwords protect OS X resources and perhaps many other resources accessed through OS X. Every password an…”
Získať plný text
Journal Article -
17
Alleviating the proliferation of JavaScript worms from online social network in cloud platforms
Vydavateľské údaje: IEEE 01.04.2016Vydané v 2016 7th International Conference on Information and Communication Systems (ICICS) (01.04.2016)“… In addition, it also detects the partial JavaScript injection by the attacker and performs the sanitization on the detected JavaScript attack vectors in a context-aware manner…”
Získať plný text
Konferenčný príspevok.. -
18
Robust Website Fingerprinting Through the Cache Occupancy Channel
ISSN: 2331-8422Vydavateľské údaje: Ithaca Cornell University Library, arXiv.org 21.02.2019Vydané v arXiv.org (21.02.2019)“…Website fingerprinting attacks, which use statistical analysis on network traffic to compromise user privacy, have been shown to be effective even if the…”
Získať plný text
Paper -
19
Teen arrested for sharing exploit that almost brought down 911
Vydavateľské údaje: New York Apollo Global Managment 30.10.2016Vydané v Engadget (30.10.2016)“… Phoenix police have arrested 18-year-old Meetkumar Hitesbhai Desai on computer tampering charges after he publicly posted a version of iOS-based JavaScript attack that he thought would only deliver…”
Získať plný text
Newspaper Article -
20
Analysis of Russian Apps for TSPU-Related Risks
ISBN: 9798382325354Vydavateľské údaje: ProQuest Dissertations & Theses 01.01.2024“… This thesis investigates the potential risks associated with these developments, focusing on the vulnerability of Russian Android applications to targeted JavaScript attacks compromising the privacy…”
Získať plný text
Dissertation

