A survey of man in the middle attacks

M Conti, N Dragoni, V Lesyk - IEEE communications surveys & …, 2016 - ieeexplore.ieee.org
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer
security, representing one of the biggest concerns for security professionals. MITM targets …

Privacy in the smart city—applications, technologies, challenges, and solutions

D Eckhoff, I Wagner - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Many modern cities strive to integrate information technology into every aspect of city life to
create so-called smart cities. Smart cities rely on a large number of application areas and …

Stack overflow considered harmful? the impact of copy&paste on android application security

F Fischer, K Böttinger, H Xiao… - … IEEE symposium on …, 2017 - ieeexplore.ieee.org
Online programming discussion platforms such as Stack Overflow serve as a rich source of
information for software developers. Available information include vibrant discussions and …

You get where you're looking for: The impact of information sources on code security

Y Acar, M Backes, S Fahl, D Kim… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Vulnerabilities in Android code--including but not limited to insecure data storage,
unprotected inter-component communication, broken TLS implementations, and violations of …

Towards secure and dependable software-defined networks

D Kreutz, FMV Ramos, P Verissimo - … workshop on Hot topics in software …, 2013 - dl.acm.org
Software-defined networking empowers network operators with more flexibility to program
their networks. With SDN, network management moves from codifying functionality in terms …

50 ways to leak your data: An exploration of apps' circumvention of the android permissions system

J Reardon, Á Feal, P Wijesekera, AEB On… - 28th USENIX security …, 2019 - usenix.org
Modern smartphone platforms implement permission-based models to protect access to
sensitive data and system resources. However, apps can circumvent the permission model …

Comparing the usability of cryptographic apis

Y Acar, M Backes, S Fahl, S Garfinkel… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Potentially dangerous cryptography errors are well-documented in many applications.
Conventional wisdom suggests that many of these errors are caused by cryptographic …

[PDF][PDF] A graduate course in applied cryptography

D Boneh, V Shoup - Draft 0.5, 2020 - dlib.hust.edu.vn
Cryptography is an indispensable tool used to protect information in computing systems. It is
used everywhere and by billions of people worldwide on a daily basis. It is used to protect …

[HTML][HTML] Rosmarinic acid and its derivatives: Current insights on anticancer potential and other biomedical applications

S Ijaz, J Iqbal, BA Abbasi, Z Ullah, T Yaseen… - Biomedicine & …, 2023 - Elsevier
Cancer is still the leading cause of death worldwide, burdening the global medical system.
Rosmarinic acid (RA) is among the first secondary metabolites discovered and it is a …

Unikernels: Library operating systems for the cloud

A Madhavapeddy, R Mortier, C Rotsos, D Scott… - ACM SIGARCH …, 2013 - dl.acm.org
We present unikernels, a new approach to deploying cloud services via applications written
in high-level source code. Unikernels are single-purpose appliances that are compile-time …