Cova, 2010 - Google Patents
Taming the malicious web: avoiding and detecting web-based attacksCova, 2010
- Document ID
- 9158714277118227293
- Author
- Cova M
- Publication year
External Links
Snippet
The world wide web has changed dramatically from its beginnings. The handful of web pages that existed two decades ago have become more than one trillion, static pages have largely been substituted by dynamic content, and web applications providing a vast range of …
- 238000000034 method 0 abstract description 98
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Stuttard et al. | The web application hacker's handbook: Finding and exploiting security flaws | |
Heartfield et al. | A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks | |
US8347392B2 (en) | Apparatus and method for analyzing and supplementing a program to provide security | |
Kapodistria et al. | An advanced web attack detection and prevention tool | |
Gupta et al. | Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions | |
Van Goethem et al. | Clubbing seals: Exploring the ecosystem of third-party security seals | |
Belous et al. | Computer viruses, malicious logic, and spyware | |
Raman | JaSPIn: JavaScript based Anomaly Detection of Cross-site scripting attacks | |
Nunes | Blended security analysis for web applications: Techniques and tools | |
Musch | Advanced attack and vulnerability scanning for the modern web | |
Cova | Taming the malicious web: avoiding and detecting web-based attacks | |
Seifert | Cost-effective detection of drive-by-download attacks with hybrid client honeypots | |
Reis | Web browsers as operating systems: supporting robust and secure web programs | |
Vernotte | A pattern-driven and model-based vulnerability testing for web applications | |
Kurella | Analysis on Vulnerability Assessment for Web Based Malware | |
Sentana | Analysis and Design of Secure and Attacks Resilient Mechanism for Online Platforms | |
de Araújo | Exploring Service Workers for Javascript Code Protection | |
Kamel et al. | Risks induced by Web applications on smart cards | |
Campobasso | Understanding and Characterizing the Cybercriminal Ecosystem Enabling Attack Innovation at Scale | |
Chehade et al. | 403 Forbidden? Ethically Evaluating Broken Access Control in the Wild | |
El Hajj Chehade et al. | 403 Forbidden? Ethically Evaluation Broken Access Control in the Wild | |
Coelho | Psyment: Security Design and Implementation of a Psychological Assessment Supportive Web Platform | |
Yang | Reducing Web Attack Surface: Mitigating Social Engineering And Code Injection Threats | |
Gilbert | Defending Against Malicious Software | |
Cordella | Web application penetration testing: an analysis of a corporate application according to OWASP guidelines |