نتایج جستجو برای: malicious user

تعداد نتایج: 253175  

2010
John P. John Fang Yu Yinglian Xie Martín Abadi Arvind Krishnamurthy

Search engines not only assist normal users, but also provide information that hackers and other malicious entities can exploit in their nefarious activities. With carefully crafted search queries, attackers can gather information such as email addresses and misconfigured or even vulnerable servers. We present SearchAudit, a framework that identifies malicious queries from massive search engine...

2009
Engin Kirda Nenad Jovanovic Christopher Kruegel Giovanni Vigna

Web applications are becoming the dominant way to provide access to online services. At the same time, web application vulnerabilities are being discovered and disclosed at an alarming rate. Web applications often make use of JavaScript code that is embedded into web pages to support dynamic client-side behavior. This script code is executed in the context of the user’s web browser. To protect ...

Journal: :Computers & Security 2009
Engin Kirda Nenad Jovanovic Christopher Krügel Giovanni Vigna

Web applications are becoming the dominant way to provide access to online services. At the same time, web application vulnerabilities are being discovered and disclosed at an alarming rate. Web applications often make use of JavaScript code that is embedded into web pages to support dynamic client-side behavior. This script code is executed in the context of the user’s web browser. To protect ...

2013
Alexis V. Pantola Susan Pancho-Festin Florante Salvador

Reputation systems measure the credibility of contributions and contributors in collaborative web systems. Measuring the credibility is significant since a collaborative environment generally allows anyone with Internet access to provide contribution. Collaborative web systems are susceptible to malicious users who intentionally provide inaccurate contents. With the help of reputation systems, ...

2017
Luka Malisa Kari Kostiainen Srdjan Capkun

Mobile application spoofing is an attack where a malicious mobile app mimics the visual appearance of another one. A common example of mobile application spoofing is a phishing attack where the adversary tricks the user into revealing her password to a malicious app that resembles the legitimate one. In this paper, we propose a novel spoofing detection approach, tailored to the protection of mo...

Journal: :J. Internet Serv. Inf. Secur. 2014
Fang-Yie Leu Yi-Ting Hsiao

In our previous work, we developed a security system which detects malicious behaviors at systemcall level. It first creates users’ personal profiles for all users of a close environment and an attacker profile for all hackers to keep track of their usage behaviors as the computer forensic features, and then determines whether or not a legally login user u is the account holder or a hacker by c...

2003
Tieyan Li Yongdong Wu

This paper proposes a browser spoofing attack which can break the weakest link from the server to user, i.e., man-computerinterface, and hence defeat the whole security system of Internet transaction. In this attack, when a client is misled to an attacker’s site, or an attacker hijacks a connection, a set of malicious HTML files are downloaded to the client’s machine. The files are used to crea...

Journal: :IJCNS 2011
Ehsan Moeen Taghavi Bahman Abolhassani

In this paper, a two step secure spectrum sensing algorithm is proposed for cognitive radio networks. In this algorithm, the sensing results of secondary users are pre-filtered and applying fuzzy logic, so, the overall sensing performance of the network is improved. To determine pre-filter parameters, statistical parameters of the sensing results are used to remove those sensing results which a...

2006
Man Ho Au Jing Chen Joseph K. Liu Yi Mu Duncan S. Wong Guomin Yang

Identity-based cryptosystems have an inherent key escrow issue, that is, the Key Generation Center (KGC) always knows user secret key. Thus, if the KGC is malicious, it can always impersonate the user. Certificateless cryptography, introduced by Al-Riyami and Paterson in 2003, is intended to solve this problem. However, in all the previously proposed certificateless schemes, it is always assume...

2004
Daniel Chou Joann Chuang Sujata Doshi

Though many techniques for finding malicious code have been developed, we found few publicized techniques for creating and hiding malicious code. Traditional malicious code examples include viruses, trojans, and worms, but we define malicious code to be any code that does not behave as the user intended. Our goal is to analyze current methods for the creation and hiding of malicious code and to...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید