From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Polyglots: crossing origins by crossing formats., , и . ACM Conference on Computer and Communications Security, стр. 753-764. ACM, (2013)mXSS attacks: attacking well-secured web-applications by using innerHTML mutations., , , , и . ACM Conference on Computer and Communications Security, стр. 777-788. ACM, (2013)Architectures for Inlining Security Monitors in Web Applications., , и . ESSoS, том 8364 из Lecture Notes in Computer Science, стр. 141-160. Springer, (2014)On-the-fly inlining of dynamic security monitors., , и . Comput. Secur., 31 (7): 827-843 (2012)Safe Wrappers and Sane Policies for Self Protecting JavaScript., , и . NordSec, том 7127 из Lecture Notes in Computer Science, стр. 239-255. Springer, (2010)May I? - Content Security Policy Endorsement for Browser Extensions., , и . DIMVA, том 9148 из Lecture Notes in Computer Science, стр. 261-281. Springer, (2015)