Security attacks are growing in an exponential manner and their impact on existing systems is seriously high and can lead to dangerous consequences. However, in order to reduce the …
D Zhang, J Zhang, Y Bu, B Chen… - … and Mobile Computing, 2022 - Wiley Online Library
With the development of modern browsing, the convenience brought by rich browser features has also produced a large number of features, which are called browser …
In this paper, we focus on authentication and authorization flaws in web apps that enable partial or full access to user accounts. Specifically, we develop a novel fully automated black …
Abstract In response, the European Union has adopted the General Data Protection Regulation (GDPR), a legislative framework for data protection empowering individuals to …
F Alaca, PC Van Oorschot - Proceedings of the 32nd annual conference …, 2016 - dl.acm.org
Device fingerprinting is commonly used for tracking users. We explore device fingerprinting but in the specific context of use for augmenting authentication, providing a state-of-the-art …
X Lin, P Ilia, S Solanki, J Polakis - 31st USENIX Security Symposium …, 2022 - usenix.org
As users navigate the web they face a multitude of threats; among them, attacks that result in account compromise can be particularly devastating. In a world fraught with data breaches …
The Web has become highly interactive and an important driver for modern life, enabling information retrieval, social exchange, and online shopping. From the security perspective …
D Liu, S Hao, H Wang - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
In a dangling DNS record (Dare), the resources pointed to by the DNS record are invalid, but the record itself has not yet been purged from DNS. In this paper, we shed light on a largely …
Single Sign-On (SSO) allows users to effortlessly navigate the Web and obtain a personalized experience without the hassle of creating and managing accounts across …