Stock
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| US10592676B2 (en) | Application security service | |
| US9674215B2 (en) | Software program identification based on program behavior | |
| US9531740B2 (en) | Software program identification based on program behavior | |
| KR101442654B1 (en) | Systems and methods for behavioral sandboxing | |
| Chang et al. | Analyzing and defending against web-based malware | |
| Guo et al. | An empirical study of malicious code in pypi ecosystem | |
| Grégio et al. | Toward a taxonomy of malware behaviors | |
| Aljabri et al. | Testing and exploiting tools to improve owasp top ten security vulnerabilities detection | |
| Agarwal | Helping or hindering? how browser extensions undermine security | |
| Gokkaya et al. | Software supply chain: review of attacks, risk assessment strategies and security controls | |
| Onarlioglu et al. | Sentinel: Securing legacy firefox extensions | |
| Beer et al. | Tabbed out: Subverting the android custom tab security model | |
| Zhang et al. | Anteater: Advanced persistent threat detection with program network traffic behavior | |
| Agarwal et al. | First, Do No Harm: Studying the manipulation of security headers in browser extensions | |
| Fredj | Spheres: an efficient server-side web application protection system | |
| Van Goethem et al. | Sok: Exploring current and future research directions on xs-leaks through an extended formal model | |
| Sundareswaran et al. | XSS-Dec: A hybrid solution to mitigate cross-site scripting attacks | |
| Nazzal et al. | Vulnerability classification of consumer-based IoT software | |
| Raman | JaSPIn: JavaScript based Anomaly Detection of Cross-site scripting attacks | |
| Kumar et al. | A review on 0-day vulnerability testing in web application | |
| Gadient et al. | Security in Android applications | |
| Stock | First, Do No Harm: Studying the manipulation of security headers in browser extensions | |
| Bai et al. | TD‐WS: a threat detection tool of WebSocket and Web Storage in HTML5 websites | |
| Bernardo | Targeted attack detection by means of free and open source solutions | |
| Panagiotakopoulos | Assessing open and closed EDRs |