system:filetype:pdf - Dave's Blog

Search

That’s What She Said: Double Entendre Identification

2011 Apr 29, 3:54That’s What She Said: Double Entendre Identification
Chlo´e Kiddon and Yuriy Brun
Computer Science & Engineering
University of Washington
Seattle WA 98195-2350
fchloe,brung@cs.washington.eduPermalinkCommentstechnology humor twss science paper csc technical system:filetype:pdf system:media:document

An Analysis of Browser Domain-Isolation Bugs

2010 Oct 28, 7:49PermalinkCommentsdavid-ross security browser research web webbrowser technical todo system:filetype:pdf system:media:document

The Emperor’s New APIs: On the (In)Secure Usage of New Client-side Primitives

2010 May 6, 7:43Covers case studies of insecure usage of HTML5 cross-document messaging and web storage.PermalinkCommentshtml html5 web browser security technical webstorage research facebook google system:filetype:pdf system:media:document

Fair Use Economy (pdf)

2010 May 4, 10:49PermalinkCommentsvia:felix42 fair-use economics pdf legal law copyright todo system:filetype:pdf system:media:document

The State of Web Development 2010 – Web Directions

2010 Apr 29, 11:51Stats from the State of Web Development 2010 web survey including: "Few respondents use any form of Internet Explorer for their day to day web use, but IE8 is the number one browser developers test their sites in. Google Chrome has jumped dramatically as the browser of choice for developers, to rank 3rd, at 17% just behind Safari at 20%."PermalinkCommentsie web browser chrome statistics development html technical system:filetype:pdf system:media:document

The Essential Message: Claude Shannon and the Making of Information Theory

2010 Apr 20, 9:34PermalinkCommentstechnical pdf information-theory cryptography history system:filetype:pdf system:media:document

A Practical Attack to De-Anonymize Social Network Users

2010 Mar 8, 1:50Paper suggests history stealing to find what popular social networking site groups a visitor to your web site belongs to and stats on how easy it is to then uniquely identify the visitor on the popular social networking site.PermalinkCommentssecurity privacy social social-network paper research web browser css technical system:filetype:pdf system:media:document

Protecting Browsers from Extension Vulnerabilities

2010 Feb 27, 10:06A web browser add-on security research paper that describes the Google Chrome security model. "We propose a new browser extension system that improves security by using least privilege, privilege separation,
and strong isolation. Our system limits the misdeeds an attacker can perform through an extension vulnerability.
Our design has been adopted as the Google Chrome extension system."PermalinkCommentssecurity design google chrome firefox addon plugin web browser technical research adam-barth system:filetype:pdf system:media:document

English Shellcode

2009 Nov 27, 6:10"What follows is a brief description of the method we have developed for encoding arbitrary shellcode as English text. This English shellcode is completely self-contained, i.e., it does not require an external loader, and executes as valid IA32 code."PermalinkCommentssecurity polyglot intel paper research programming hack obfuscation english language technical system:filetype:pdf system:media:document

WHEN ZOMBIES ATTACK!: MATHEMATICAL MODELLING OF AN OUTBREAK OF ZOMBIE INFECTION

2009 Aug 25, 7:10Research paper modelling zombie infection. "The key difference between the models presented here and other models of infectious disease is that the dead can come back to life." Also, love the references section with "Snyder, Zack (director), 2004 Dawn of the Dead" next to things like "Bainov, D.D. & Simeonov, P.S. Impulsive Differential Equations: Asymptotic Properties of the Solutions. World Scientific, Singapore (1995)."PermalinkCommentshumor zombie research via:schneier math science health apocalypse system:filetype:pdf system:media:document

Fight Against 1-day Exploits: Diffing Binaries vs Anti-diffing Binaries

2009 Aug 24, 9:52Notes on how bin diff'ing tools work and thoughts on defeating them. "We call the threat "1-day exploits". Just few minutes after the release of patches, binary diffing technique can be used to identify the vulnerabilities that the security patches are remedying."PermalinkCommentsexploit security binary diff tool research technical system:filetype:pdf system:media:document

Compact E-Cash

2009 Aug 14, 6:20"This paper presents efficient off-line anonymous e-cash schemes where a user can withdraw a wallet containing coins each of which she can spend unlinkably."PermalinkCommentsmoney future reference research economics cryptography technical system:filetype:pdf system:media:document

Guidelines for Media Sanitization - Recommendations of the National Institute of Standards and Technology

2009 Jul 29, 3:18PermalinkCommentssecurity computer storage nist erase technical system:filetype:pdf system:media:document
Older Entries Creative Commons License Some rights reserved.