[go: up one dir, main page]

Cova, 2010 - Google Patents

Taming the malicious web: avoiding and detecting web-based attacks

Cova, 2010

Document ID
9158714277118227293
Author
Cova M
Publication year

External Links

Snippet

The world wide web has changed dramatically from its beginnings. The handful of web pages that existed two decades ago have become more than one trillion, static pages have largely been substituted by dynamic content, and web applications providing a vast range of …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis

Similar Documents

Publication Publication Date Title
Stuttard et al. The web application hacker's handbook: Finding and exploiting security flaws
Heartfield et al. A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks
US8347392B2 (en) Apparatus and method for analyzing and supplementing a program to provide security
Kapodistria et al. An advanced web attack detection and prevention tool
Gupta et al. Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions
Van Goethem et al. Clubbing seals: Exploring the ecosystem of third-party security seals
Belous et al. Computer viruses, malicious logic, and spyware
Raman JaSPIn: JavaScript based Anomaly Detection of Cross-site scripting attacks
Nunes Blended security analysis for web applications: Techniques and tools
Musch Advanced attack and vulnerability scanning for the modern web
Cova Taming the malicious web: avoiding and detecting web-based attacks
Seifert Cost-effective detection of drive-by-download attacks with hybrid client honeypots
Reis Web browsers as operating systems: supporting robust and secure web programs
Vernotte A pattern-driven and model-based vulnerability testing for web applications
Kurella Analysis on Vulnerability Assessment for Web Based Malware
Sentana Analysis and Design of Secure and Attacks Resilient Mechanism for Online Platforms
de Araújo Exploring Service Workers for Javascript Code Protection
Kamel et al. Risks induced by Web applications on smart cards
Campobasso Understanding and Characterizing the Cybercriminal Ecosystem Enabling Attack Innovation at Scale
Chehade et al. 403 Forbidden? Ethically Evaluating Broken Access Control in the Wild
El Hajj Chehade et al. 403 Forbidden? Ethically Evaluation Broken Access Control in the Wild
Coelho Psyment: Security Design and Implementation of a Psychological Assessment Supportive Web Platform
Yang Reducing Web Attack Surface: Mitigating Social Engineering And Code Injection Threats‬‭
Gilbert Defending Against Malicious Software
Cordella Web application penetration testing: an analysis of a corporate application according to OWASP guidelines