[go: up one dir, main page]

Langweg, 2004 - Google Patents

Building a trusted path for applications using COTS components

Langweg, 2004

View PDF
Document ID
5793968592046293892
Author
Langweg H
Publication year
Publication venue
Proc. NATO RTS IST Panel Symposium on Adaptive Defence in Unclassified Networks

External Links

Snippet

Building a Trusted Path for Applications Using COTS Components Page 1 RTO-MP-IST-041 21 - 1 Building a Trusted Path for Applications Using COTS Components Hanno Langweg Norwegian Information Security Laboratory – NISlab1 Department of Computer Science and …
Continue reading at apps.dtic.mil (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Bianchi et al. What the app is that? deception and countermeasures in the android user interface
Ye et al. Trusted paths for browsers
Viega et al. Building secure software: how to avoid security problems the right way
Fernandes et al. Android ui deception revisited: Attacks and defenses
EP1512057B1 (en) Trusted user interface for a secure mobile wireless device
Kienzle et al. Security patterns repository version 1.0
Pistoia et al. Java 2 network security
Yang et al. Sok: Decoding the super app enigma: The security mechanisms, threats, and trade-offs in os-alike apps
Kumar J2EE Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice
Ye et al. Web spoofing revisited: SSL and beyond
Mao et al. Trojan horse resistant discretionary access control
Langweg Building a trusted path for applications using COTS components
Raman JaSPIn: JavaScript based Anomaly Detection of Cross-site scripting attacks
Xuan et al. Droidpill: pwn your daily-use apps
De Paoli et al. Web browsers and security
Nabi Designing a framework method for secure business application logic integrity in e-commerce systems
Kalysch Android Application Hardening: Attack Surface Reduction and IP Protection Mechanisms
Niemietz Analysis of UI redressing attacks and countermeasures
Musch Advanced attack and vulnerability scanning for the modern web
Leppänen An evaluation of how web frameworks support developers to build secure applications
Skoularidou et al. Security architectures for network clients
Xenitellis A new avenue of attack: Event-driven system vulnerabilities
Nentwich et al. Practical security aspects of digital signature systems
Langweg et al. Extending the Trusted Path in Client-Server Interaction
Ghosh Security risks of java cards