搜索结果: 1-8 共查到“工学 vulnerabilities”相关记录8条 . 查询时间(0.063 秒)
Researchers Find Vulnerabilities in iPhone,iPad Operating System
Researchers Vulnerabilities iPhone iPad Operating System
2016/9/12
Recent literature on iOS security has focused on the malicious potential of third-party applications, demonstrating how developers can bypass application vetting and code-level protections. In additio...
Researchers find vulnerabilities in cars connected to smartphones
Researchers vulnerabilities cars connected smartphones
2016/9/12
Many of today’s automobiles leave the factory with secret passengers: prototype software features that are disabled but that can be unlocked by clever drivers.
In what is believed to be the first com...
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
Towards Automated Detection Buffer Overrun Vulnerabilities
2016/5/24
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection of buffer overruns as...
Static Detection of Security Vulnerabilities in Scripting Languages
Static Detection Security Vulnerabilities Scripting Languages
2016/5/24
We present a static analysis algorithm for detecting security vulnerabilities in PHP, a popular server-side scripting language for building web applications. Our analysis employs a novel three-tier ar...
Researchers Find Vulnerabilities in Use of Certificates for Web Security
Researchers Vulnerabilities in Use of Certificates Web Security
2015/11/12
Consumers use the Internet for banking, emailing, shopping and much more nowadays. With so much personal and private information being transmitted over the Web, Internet users must be able to rely on ...
Busting frame busting: a study of clickjacking vulnerabilities at popular sites
popular sites clickjacking vulnerabilities
2015/8/5
Web framing attacks such as clickjacking use iframes to hijack a user's web session. The most common defense, called frame busting, prevents a site from functioning when loaded inside a frame. We stud...
Key Vulnerabilities and Limitations in the Management of Hazardous Waste and Its Disposal: A Checklist Assessment Tool
Hazardous Waste Vulnerabilities Checklist Environmental Crime
2013/3/13
From an environmental protection perspective, the crucial issues pertaining to the policing of hazardous waste relate to both the vulnerabilities and limitations of current practices, and the potentia...
Urban Vulnerabilities in the Kathmandu Valley, Nepal: Visualizations of Human/Hazard Interactions
Urban Vulnerability Planning Kathmandu Valley Two Dimensional (2D) Maps Three Dimensional (3D) Visualization
2013/3/5
Excessive unplanned urban growth leads to many vulnerabilities and impacts on urban environments to varying degrees. However, the majority of the extant literature focuses on the problems related to l...