Results 41 to 50 of about 6,814 (243)
Runtime Prevention of Deserialization Attacks [PDF]
Untrusted deserialization exploits, where a serialised object graph is used to achieve denial-of-service or arbitrary code execution, have become so prominent that they were introduced in the 2017 OWASP Top 10. In this paper, we present a novel and lightweight approach for runtime prevention of deserialization attacks using Markov chains. The intuition
arxiv +1 more source
Anomaly Detection for Soft Security in Cloud Based Auditing of Accounting Systems [PDF]
Postprin
Duncan, Bob, Neovius, Mats
core +1 more source
ASATM: Automated security assistant of threat models in intelligent transportation systems
Abstract The evolution of technology has led to the appearance of smart cities. An essential element in such cities is smart mobility that covers the subjects related to Intelligent Transportation Systems (ITS). The problem is that the ITS vulnerabilities may considerably harm the life quality and safety status of human beings living in smart cities ...
Mohammad Ali Ramazanzadeh+2 more
wiley +1 more source
Effective Filter for Common Injection Attacks in Online Web Applications
Injection attacks against web applications are still frequent, and organizations like OWASP places them within the Top Ten of security risks to web applications. The main goal of this work is to contribute to the community with the design of an effective
Santiago Ibarra-Fiallos+5 more
doaj +1 more source
Some security issues for web based frameworks [PDF]
This report investigates whether a vulnerability found in one web framework may be used to find a vulnerability in a different web framework. To test this hypothesis, several open source applications were installed in a secure test environment together ...
Ellman, Jeremy, Roberts-Morpeth, P.
core +1 more source
Model-Driven Cyber Range Training: A Cyber Security Assurance Perspective [PDF]
Security demands are increasing for all types of organisations, due to the ever-closer integration of computing infrastructures and smart devices into all aspects of the organisational operations.
Fysarakis, K.+3 more
core +1 more source
Technological developments in the field of increasingly advanced computers and networks have caused many organizations to use web applications to provide business services.
Ilham Firman Ashari+3 more
doaj +1 more source
Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot [PDF]
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development.
Cerrudo Cesar+13 more
core +2 more sources
The development of website applications is currently growing rapidly, but it is not followed by a good security system that can cause the number of security holes that can be entered by the attacker. The number of website applications that are vulnerable
Imam Riadi, Rusydi Umar, Wasito Sukarno
doaj +1 more source
Idea-caution before exploitation:the use of cybersecurity domain knowledge to educate software engineers against software vulnerabilities [PDF]
The transfer of cybersecurity domain knowledge from security experts (‘Ethical Hackers’) to software engineers is discussed in terms of desirability and feasibility. Possible mechanisms for the transfer are critically examined.
C Huang+15 more
core +1 more source