Crispo, Bruno
210  Ergebnisse:
Personensuche X
?
1

The Nonce-nce of Web Security: An Investigation of CSP Nonc..:

, In: Computer Security. ESORICS 2023 International Workshops; Lecture Notes in Computer Science,
 
?
2

$$\mu $$IPS: Software-Based Intrusion Prevention for Bare-M..:

, In: Computer Security – ESORICS 2023; Lecture Notes in Computer Science,
Degani, Luca ; Salehi, Majid ; Martinelli, Fabio. - p. 311-331 , 2024
 
?
3

AppBox: A Black-Box Application Sandboxing Technique for Mo..:

, In: 2023 IEEE Symposium on Computers and Communications (ISCC),
 
?
4

Usable Identity and Access Management Schemes for Smart Cit..:

, In: Collaborative Approaches for Cyber Security in Cyber-Physical Systems; Advanced Sciences and Technologies for Security Applications,
Gupta, Sandeep ; Crispo, Bruno - p. 47-61 , 2023
 
?
5

Discovery and Identification of Memory Corruption Vulnerabi..:

Salehi, Majid ; Degani, Luca ; Roveri, Marco..
IEEE Transactions on Dependable and Secure Computing.  20 (2023)  2 - p. 1124-1138 , 2023
 
?
7

OAuth 2.0 Redirect URI Validation Falls Short, Literally:

, In: Proceedings of the 39th Annual Computer Security Applications Conference,
 
?
8

Device Behavioral Profiling for Autonomous Protection Using..:

, In: 2023 IEEE Symposium on Computers and Communications (ISCC),
Gupta, Sandeep ; Crispo, Bruno - p. 474-478 , 2023
 
?
9

Mind the CORS:

, In: 2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA),
 
?
 
?
11

RiderAuth: A cancelable touch-signature based rider authent..:

Gupta, Sandeep ; Raja, Kiran ; Martinelli, Fabio.
Journal of Information Security and Applications.  71 (2022)  - p. 103357 , 2022
 
?
12

Ubiquitous Security: First International Conference, UbiSec.. 

Communications in Computer and Information Science, 1557
Wang, Guojun ; Choo, Kim-Kwang Raymond ; Ko, Ryan K. L.. - 1st ed. 2022 . , 2022
 
?
13

WiP: Metamodel for Continuous Authorisation and Usage Contr..:

, In: Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies,
 
?
14

Generative adversarial networks for subdomain enumeration:

, In: Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing,
 
1-15