CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security Policy.
Lukas WeichselbaumMichele SpagnuoloSebastian LekiesArtur JancPublished in: CCS (2016)
Keyphrases
- constraint satisfaction problems
- security policies
- decomposition methods
- constraint satisfaction
- access control
- constraint programming
- metadata
- security management
- constraint propagation
- network security
- arc consistency
- security concerns
- network management
- search space
- real world
- np complete
- security requirements
- security architecture
- home network