Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Balzarotti, Davide Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 2 of 2 reviews    
   Automatic extraction of indicators of compromise for web applications
Catakoglu O., Balduzzi M., Balzarotti D.  WWW 2016 (Proceedings of the 25th International Conference on the World Wide Web, Montréal, Québec, Canada, Apr 11-15, 2016) 333-343, 2016.  Type: Proceedings

Small, harmless scripts can help identify compromised websites that have remained undetected for years. By analyzing external components used by attackers to make a compromised page run smoothly, for example JavaScript libraries or scr...
...
Sep 8 2016  
  On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment
Pék G., Lanzi A., Srivastava A., Balzarotti D., Francillon A., Neumann C.  ASIA CCS 2014 (Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, Kyoto, Japan, Jun 4-6, 2014) 305-316, 2014.  Type: Proceedings

In recent years, virtual machines (VMs) have become clearly very important for the computing infrastructure of companies. It is therefore not surprising that attacks on VMs have increased. The paper looks at threats to, and defenses of...
...
Oct 8 2014  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy