Abstract. Many applications in the enterprise world feature thick Java clients. Testing the security of such applications is considered practically more difficult than a similar browser-based client because inspecting, intercepting and altering application data is easy in the browser. With DOM inspection tools like Firebug and WebKit Web Inspector, and HTTP proxy tools such as WebScarab, Fiddler and Burp, assessing the trust boundary between the client and server has become mostly commoditized in web applications. Security practitioners have been struggling to reach the same level of effectiveness when testing thick Java clients. Researchers have previously tried to statically alter the application code through decompilation and recompilati...
The most dangerous security-related software errors, according to the OWASP Top Ten 2017 list, affec...
A monitoring application, called (Signed) Applet Watch-Dog, is proposed to control the execution of ...
As the use of web applications is increasing among a number of different industries, many companies ...
Applications Security Testing tools are one of the resources most widely used by developers to guara...
Since the last decade, most of the enterprise applications were developed in Java because Java is be...
Web application programmers must be aware of a wide range of potential security risks. Although the ...
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web s...
Binary rewriting techniques have been developed to allow users to enforce security policies directly...
Conventional methods supporting Java binary security mainly rely on the security of the hosts Java V...
This report documents the attempt to raise security for clients against a threat model, with these t...
The Java Virtual Machine (JVM) is evolving as an infrastructure for the efficient execution of large...
Abstract Extensible component-based platforms al-low dynamic discovery, installation and execution o...
The purpose of this project is to develop a generic Java Application Programming Interface (API) tha...
Web space is currently inherent in any business activity, from SMEs to international holdings. In th...
This project focuses on web security. Some of the most famous vulnerabilities, known troubling web a...
The most dangerous security-related software errors, according to the OWASP Top Ten 2017 list, affec...
A monitoring application, called (Signed) Applet Watch-Dog, is proposed to control the execution of ...
As the use of web applications is increasing among a number of different industries, many companies ...
Applications Security Testing tools are one of the resources most widely used by developers to guara...
Since the last decade, most of the enterprise applications were developed in Java because Java is be...
Web application programmers must be aware of a wide range of potential security risks. Although the ...
The Java (TM) Virtual Machine is being used more frequently as the basic engine behind dynamic web s...
Binary rewriting techniques have been developed to allow users to enforce security policies directly...
Conventional methods supporting Java binary security mainly rely on the security of the hosts Java V...
This report documents the attempt to raise security for clients against a threat model, with these t...
The Java Virtual Machine (JVM) is evolving as an infrastructure for the efficient execution of large...
Abstract Extensible component-based platforms al-low dynamic discovery, installation and execution o...
The purpose of this project is to develop a generic Java Application Programming Interface (API) tha...
Web space is currently inherent in any business activity, from SMEs to international holdings. In th...
This project focuses on web security. Some of the most famous vulnerabilities, known troubling web a...
The most dangerous security-related software errors, according to the OWASP Top Ten 2017 list, affec...
A monitoring application, called (Signed) Applet Watch-Dog, is proposed to control the execution of ...
As the use of web applications is increasing among a number of different industries, many companies ...