First Page | Document Content | |
---|---|---|
Date: 2011-12-23 02:37:56Internet URI schemes Malware JavaScript Webalizer Client honeypot World Wide Web HTTP referer Spyware Computing Espionage Uniform resource locator | Proceedings of the APAN – Network Research WorkshopAnalysis of Redirection Caused by Web-based Malware Yuta Takata 1,*, Shigeki Goto 1,* and Tatsuya Mori 2 1 Waseda UniversityOkubo, Shinjuku-ku, Tokyo,Add to Reading ListSource URL: nsl.cs.waseda.ac.jpDownload Document from Source WebsiteFile Size: 626,30 KBShare Document on Facebook |
Finding and Preventing Bugs in JavaScript Bindings Fraser Brown⋆ Dawson Engler⋆ ⋆ Shravan Narayan†DocID: 1xVUa - View Document | |
Reading sensor data for 4-digit PINs using JavaScript Author: Maryam Mehrnezhad (), Apr 2017 In this help file, we describe the details of our JavaScript code used for reading sensor data (motion anDocID: 1xVLq - View Document | |
A Trusted Mechanised JavaScript Specification Martin Bodin Arthur Charguéraud Daniele FilarettiDocID: 1xVf7 - View Document | |
Isolating JavaScript with Filters, Rewriting, and Wrappers Sergio Maffeis1 , John C. Mitchell2 , and Ankur Taly2 1 Imperial College LondonDocID: 1xV5b - View Document | |
Run-Time Enforcement of Secure JavaScript Subsets Sergio Maffeis Imperial College London John C. MitchellDocID: 1xV40 - View Document |