Langweg, 2004 - Google Patents
Building a trusted path for applications using COTS componentsLangweg, 2004
View PDF- Document ID
- 5793968592046293892
- Author
- Langweg H
- Publication year
- Publication venue
- Proc. NATO RTS IST Panel Symposium on Adaptive Defence in Unclassified Networks
External Links
Snippet
Building a Trusted Path for Applications Using COTS Components Page 1 RTO-MP-IST-041
21 - 1 Building a Trusted Path for Applications Using COTS Components Hanno Langweg
Norwegian Information Security Laboratory – NISlab1 Department of Computer Science and …
- 238000000034 method 0 description 34
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bianchi et al. | What the app is that? deception and countermeasures in the android user interface | |
Ye et al. | Trusted paths for browsers | |
Viega et al. | Building secure software: how to avoid security problems the right way | |
Fernandes et al. | Android ui deception revisited: Attacks and defenses | |
EP1512057B1 (en) | Trusted user interface for a secure mobile wireless device | |
Kienzle et al. | Security patterns repository version 1.0 | |
Pistoia et al. | Java 2 network security | |
Yang et al. | Sok: Decoding the super app enigma: The security mechanisms, threats, and trade-offs in os-alike apps | |
Kumar | J2EE Security for Servlets, EJBs and Web Services: Applying Theory and Standards to Practice | |
Ye et al. | Web spoofing revisited: SSL and beyond | |
Mao et al. | Trojan horse resistant discretionary access control | |
Langweg | Building a trusted path for applications using COTS components | |
Raman | JaSPIn: JavaScript based Anomaly Detection of Cross-site scripting attacks | |
Xuan et al. | Droidpill: pwn your daily-use apps | |
De Paoli et al. | Web browsers and security | |
Nabi | Designing a framework method for secure business application logic integrity in e-commerce systems | |
Kalysch | Android Application Hardening: Attack Surface Reduction and IP Protection Mechanisms | |
Niemietz | Analysis of UI redressing attacks and countermeasures | |
Musch | Advanced attack and vulnerability scanning for the modern web | |
Leppänen | An evaluation of how web frameworks support developers to build secure applications | |
Skoularidou et al. | Security architectures for network clients | |
Xenitellis | A new avenue of attack: Event-driven system vulnerabilities | |
Nentwich et al. | Practical security aspects of digital signature systems | |
Langweg et al. | Extending the Trusted Path in Client-Server Interaction | |
Ghosh | Security risks of java cards |