Results 41 to 50 of about 6,814 (243)

Runtime Prevention of Deserialization Attacks [PDF]

open access: yes, 2022
Untrusted deserialization exploits, where a serialised object graph is used to achieve denial-of-service or arbitrary code execution, have become so prominent that they were introduced in the 2017 OWASP Top 10. In this paper, we present a novel and lightweight approach for runtime prevention of deserialization attacks using Markov chains. The intuition
arxiv   +1 more source

ASATM: Automated security assistant of threat models in intelligent transportation systems

open access: yesIET Computers &Digital Techniques, Volume 16, Issue 5-6, Page 141-158, September-November 2022., 2022
Abstract The evolution of technology has led to the appearance of smart cities. An essential element in such cities is smart mobility that covers the subjects related to Intelligent Transportation Systems (ITS). The problem is that the ITS vulnerabilities may considerably harm the life quality and safety status of human beings living in smart cities ...
Mohammad Ali Ramazanzadeh   +2 more
wiley   +1 more source

Effective Filter for Common Injection Attacks in Online Web Applications

open access: yesIEEE Access, 2021
Injection attacks against web applications are still frequent, and organizations like OWASP places them within the Top Ten of security risks to web applications. The main goal of this work is to contribute to the community with the design of an effective
Santiago Ibarra-Fiallos   +5 more
doaj   +1 more source

Some security issues for web based frameworks [PDF]

open access: yes, 2010
This report investigates whether a vulnerability found in one web framework may be used to find a vulnerability in a different web framework. To test this hypothesis, several open source applications were installed in a secure test environment together ...
Ellman, Jeremy, Roberts-Morpeth, P.
core   +1 more source

Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective [PDF]

open access: yes, 2020
Security demands are increasing for all types of organisations, due to the ever-closer integration of computing infrastructures and smart devices into all aspects of the organisational operations.
Fysarakis, K.   +3 more
core   +1 more source

Analysis of Cross Site Request Forgery (CSRF) Attacks on West Lampung Regency Websites Using OWASP ZAP Tools

open access: yesJurnal Sisfokom, 2022
Technological developments in the field of increasingly advanced computers and networks have caused many organizations to use web applications to provide business services.
Ilham Firman Ashari   +3 more
doaj   +1 more source

Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot [PDF]

open access: yes, 2018
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development.
Cerrudo Cesar   +13 more
core   +2 more sources

Vulnerability of injection attacks against the application security of framework based websites open web access security project (OWASP)

open access: yesJurnal Informatika, 2018
The development of website applications is currently growing rapidly, but it is not followed by a good security system that can cause the number of security holes that can be entered by the attacker. The number of website applications that are vulnerable
Imam Riadi, Rusydi Umar, Wasito Sukarno
doaj   +1 more source

Idea-caution before exploitation:the use of cybersecurity domain knowledge to educate software engineers against software vulnerabilities [PDF]

open access: yes, 2017
The transfer of cybersecurity domain knowledge from security experts (‘Ethical Hackers’) to software engineers is discussed in terms of desirability and feasibility. Possible mechanisms for the transfer are critically examined.
C Huang   +15 more
core   +1 more source

Home - About - Disclaimer - Privacy