Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.Cataloged from PDF version of thesis.Includes bibliographical references (page 53).The SOLAR system helps restore interconnected system integrity after security attacks with a focus of minimizing the exposure of sensitive data in the repair logs. It builds upon Warp, a repair system for Django web applications which logs all major actions taken by the server from incoming request to outgoing response, and addresses the inherent security vulnerability of logging all data and actions. It provides application developers with a way of notating particular fields as sensitive and ensures that the exposure of these fields to the ...
Many organizations, to save costs, are moving to Bring Your Own Mobile Device (BYOD). In these scena...
In this paper, we present the design and implementation of ITDB, a self-healing or intrusion-toleran...
Web systems have become an integral part in daily life of billions of people. Social is a key charac...
Frameworks are actively used today as a tool to simplify development processes and to create secure ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
In many client-facing applications, a vulnerability in any part can compromise the entire applicatio...
Abstract—In many client-facing applications, a vulnera-bility in any part can compromise the entire ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
In recent years, our society has seen a shift towards a reliance on digital means of data storage. T...
Checking the vulnerability and vulnerability history of green economy friendly critical infrastructu...
Modern web applications store sensitive data on their servers. Such data is prone to theft resulting...
Nowadays, usage of internet has increased for various purposes like online shopping, online transact...
The importance of software in the world today cannot be overstated. Unfortunately, software is riddl...
Database security research aims to protect a database from unintended activities, such as authentica...
Internet application technologies, such as cloud computing and cloud storage, have increasingly chan...
Many organizations, to save costs, are moving to Bring Your Own Mobile Device (BYOD). In these scena...
In this paper, we present the design and implementation of ITDB, a self-healing or intrusion-toleran...
Web systems have become an integral part in daily life of billions of people. Social is a key charac...
Frameworks are actively used today as a tool to simplify development processes and to create secure ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
In many client-facing applications, a vulnerability in any part can compromise the entire applicatio...
Abstract—In many client-facing applications, a vulnera-bility in any part can compromise the entire ...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
In recent years, our society has seen a shift towards a reliance on digital means of data storage. T...
Checking the vulnerability and vulnerability history of green economy friendly critical infrastructu...
Modern web applications store sensitive data on their servers. Such data is prone to theft resulting...
Nowadays, usage of internet has increased for various purposes like online shopping, online transact...
The importance of software in the world today cannot be overstated. Unfortunately, software is riddl...
Database security research aims to protect a database from unintended activities, such as authentica...
Internet application technologies, such as cloud computing and cloud storage, have increasingly chan...
Many organizations, to save costs, are moving to Bring Your Own Mobile Device (BYOD). In these scena...
In this paper, we present the design and implementation of ITDB, a self-healing or intrusion-toleran...
Web systems have become an integral part in daily life of billions of people. Social is a key charac...