Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense.
Adam BarthJoel WeinbergerDawn SongPublished in: USENIX Security Symposium (2009)
Keyphrases
- false alarms
- web applications
- automatic identification
- detection algorithm
- detection rate
- object detection
- anomaly detection
- automatic detection
- detection accuracy
- web services
- false positives
- intrusion detection
- data sets
- open source
- information systems
- event detection
- object recognition
- database systems
- search engine
- website
- neural network