Integration biometrics in web application: Security for web apps [PDF]
To evaluate the effectiveness of biometric security systems, an information theoretic framework is constructed. First, two performance metrics privacy, determined by the biometric measurements' normalized equivocation rate, and security, determined by ...
Wulandari Kusuma Herdanu +2 more
doaj +1 more source
Robust Image Hashing Scheme Based on Low-Rank Decomposition and Path Integral LBP
This paper presents a robust image hashing algorithm that exploits low-rank decomposition and path integral local binary pattern (pi-LBP), referred to LRPL hashing.
Hengfu Yang, Jianping Yin, Ying Yang
doaj +1 more source
A Survey of Exploitation and Detection Methods of XSS Vulnerabilities
As web applications become more prevalent, web security becomes more and more important. Cross-site scripting vulnerability abbreviated as XSS is a kind of common injection web vulnerability.
Miao Liu +3 more
doaj +1 more source
Learning DOM Trees of Web Pages by Subpath Kernel and Detecting Fake e-Commerce Sites
The subpath kernel is a class of positive definite kernels defined over trees, which has the following advantages for the purposes of classification, regression and clustering: it can be incorporated into a variety of powerful kernel machines including ...
Kilho Shin +3 more
doaj +1 more source
Toward Exposing Timing-Based Probing Attacks in Web Applications
Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web
Jian Mao +4 more
doaj +1 more source
Circuit: A JavaScript Memory Heap-Based Approach for Precisely Detecting Cryptojacking Websites
Cryptojacking is often used by attackers as a means of gaining profits by exploiting users’ resources without their consent, despite the anticipated positive effect of browser-based cryptomining.
Hyunji Hong +4 more
doaj +1 more source
Grey-Box Fuzzing Based on Reinforcement Learning for XSS Vulnerabilities
Cross-site scripting (XSS) vulnerabilities are significant threats to web applications. The number of XSS vulnerabilities reported has increased annually for the past three years, posing a considerable challenge to web application maintainers.
Xuyan Song +3 more
doaj +1 more source
Secure sessions for web services [PDF]
We address the problem of securing sequences of SOAP messages exchanged between web services and their clients. The WS-Security standard defines basic mechanisms to secure SOAP traffic, one message at a time. For typical web services, however, using WS-Security independently for each message is rather inefficient; moreover, it is often ...
Bhargavan, Karthikeyan +3 more
openaire +3 more sources
A Security-Oriented Analysis of Web Inclusions in the Italian Public Administration
Modern web sites serve content that browsers fetch automatically from a number of different web servers that may be placed anywhere in the world. Such content is essential for defining the appearance and behavior of a web site and is thus a potential ...
Bartoli A. +4 more
doaj +1 more source
Improved High-Order Masked Generation of Masking Vector and Rejection Sampling in Dilithium
for Dilithium, the post-quantum signature scheme recently standardized by NIST. We improve the masked generation of the masking vector y, based on a fast Booleanto- arithmetic conversion modulo q.
Jean-Sébastien Coron +4 more
doaj +1 more source

