IMinds

Results: 115



#Item
91Domain name / Top-level domain / Typosquatting / Domain registration / Cybersquatting / Domain parking / Whois / .uk / Domain / Domain name system / Internet / Network architecture

Bitsquatting: Exploiting Bit-flips for Fun, or Profit? Nick Nikiforakis, Steven Van Acker, Wannes Meert† , Lieven Desmet, Frank Piessens, Wouter Joosen iMinds-DistriNet / † DTAI, KU Leuven, 3001 Leuven, Belgium firs

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-03-21 09:40:46
92Computer programming / Memory management / Concurrent computing / Buffer overflow protection / Heap overflow / C dynamic memory allocation / Buffer overflow / Address space layout randomization / C / Computing / Software engineering / Software bugs

HeapSentry: Kernel-assisted Protection against Heap Overflows Nick Nikiforakis, Frank Piessens, and Wouter Joosen iMinds-DistriNet, KU Leuven, 3001 Leuven, Belgium {firstname.lastname}@cs.kuleuven.be

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-04-22 08:41:11
93Greasemonkey / Cross-site scripting / JavaScript / Google Chrome / HTTP cookie / Augmented browsing / Opera / Cross-site request forgery / Code injection / Software / Mozilla add-ons / Portable software

Monkey-in-the-browser: Malware and Vulnerabilities in Augmented Browsing Script Markets Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen {firstname.lastname}@cs.kuleuven.be iMinds-DistriNe

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2014-04-02 11:29:14
94Cross-platform software / Internet privacy / HTML / Google Chrome / JavaScript / HTTP cookie / Firefox / Browser wars / Privacy mode / Software / Computing / Web browsers

Cookieless Monster: Exploring the Ecosystem of Web-based Device Fingerprinting Nick Nikiforakis∗ , Alexandros Kapravelos† , Wouter Joosen∗ , Christopher Kruegel† , Frank Piessens∗ , Giovanni Vigna† ∗ iMinds

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-03-11 10:59:39
95Web browsers / Portable software / News aggregators / Phishing / Tabnabbing / Google Chrome / Malware / Aza Raskin / Firefox / Software / Social engineering / Computer crimes

TabShots: Client-Side Detection of Tabnabbing Attacks Philippe De Ryck, Nick Nikiforakis, Lieven Desmet, Wouter Joosen iMinds-Distrinet, KU Leuven, 3001 Leuven, Belgium [removed]

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2013-02-22 04:41:51
96Information flow / Information theory / Declassification / Entailment / Forcing / Schedule / Logic / Information / Data privacy

Stateful Declassification Policies for Event-Driven Programs Mathy Vanhoef, Willem De Groef, Dominique Devriese, Frank Piessens iMinds-DistriNet, KU Leuven {firstname.lastname}@cs.kuleuven.be Abstract—We propose a nov

Add to Reading List

Source URL: lirias.kuleuven.be

Language: English
97Cryptographic protocols / Secure communication / Security / Internet privacy / HTTP Strict Transport Security / HTTP Secure / Transport Layer Security / Phishing / HTTP cookie / HTTP / Internet / Computing

Security Analysis of the Chinese Web: How well is it protected? Ping Chen† , Nick Nikiforakis‡ , Lieven Desmet† , Christophe Huygens† † iMinds-DistriNet, KU Leuven, 3001 Leuven, Belgium

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2014-12-01 17:47:28
98HTTP / Software testing / Computer network security / Cross-site scripting / Cross-site request forgery / HTTP cookie / Google Chrome / HTTP Strict Transport Security / JavaScript / Computing / Software / Computer security

Large-scale Security Analysis of the Web: Challenges and Findings Tom van Goethem, Ping Chen, Nick Nikiforakis, Lieven Desmet, and Wouter Joosen iMinds-DistriNet, KU Leuven 3001 Leuven, Belgium

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2014-05-19 11:26:35
99Computing / Computer network security / Software testing / Trust seal / Cross-site scripting / Vulnerability / Cross-site request forgery / Qualys / SQL injection / Computer security / Cyberwarfare / Electronic commerce

Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals Tom Van Goethem‡ , Frank Piessens‡ , Wouter Joosen‡ , Nick Nikiforakis† ‡ iMinds-Distrinet, KU Leuven, 3001 Leuven, Belgium

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2014-11-26 15:35:04
100Cryptographic protocols / Network architecture / Secure communication / Network protocols / Computer network security / HTTP cookie / Transport Layer Security / Session / Cross-site request forgery / Computing / HTTP / Internet

1 Eradicating Bearer Tokens for Session Management Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen iMinds-DistriNet, KU Leuven, 3001 Leuven, Belgium {firstname.lastname}@cs.kuleuven.be

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
UPDATE