Author of the publication

Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis.

, , , , , and . NDSS, The Internet Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bayesian Event Classification for Intrusion Detection., , , and . ACSAC, page 14-23. IEEE Computer Society, (2003)Stateful Intrusion Detection for High-Speed Networks., , , and . IEEE Symposium on Security and Privacy, page 285-293. IEEE Computer Society, (2002)Exploring Multiple Execution Paths for Malware Analysis., , and . IEEE Symposium on Security and Privacy, page 231-245. IEEE Computer Society, (2007)DPS : An Architectural Style for Development of Secure Software., , , and . InfraSec, volume 2437 of Lecture Notes in Computer Science, page 180-198. Springer, (2002)Decentralized Event Correlation for Intrusion Detection., , and . ICISC, volume 2288 of Lecture Notes in Computer Science, page 114-131. Springer, (2001)Protecting a Moving Target: Addressing Web Application Concept Drift., , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 21-40. Springer, (2009)Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection., , , and . RAID, volume 8688 of Lecture Notes in Computer Science, page 130-149. Springer, (2014)Detection and analysis of drive-by-download attacks and malicious JavaScript code., , and . WWW, page 281-290. ACM, (2010)Protecting Users against Phishing Attacks., and . Comput. J., 49 (5): 554-561 (2006)Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)., , and . IEEE Symposium on Security and Privacy, page 258-263. IEEE Computer Society, (2006)