2010
DOI: 10.1016/s1353-4858(10)70033-7
|View full text |Cite
|
Sign up to set email alerts
|

Divide and conquer: the threats posed by hybrid apps and HTML 5

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Instead of selecting an edge randomly, we give priorities to the outgoing edges which lead to an uncovered node. For example, as in Figure 5, currently, we have traversed the following path [0, 1, 2, 3, 1], and we have two edges for selection, [1,2] and [1,4]. Because node 4 has not been covered in the current traversal, we give priority to [1,4] to accelerate the process to include all nodes in the graph.…”
Section: Inputmentioning
confidence: 99%
See 1 more Smart Citation
“…Instead of selecting an edge randomly, we give priorities to the outgoing edges which lead to an uncovered node. For example, as in Figure 5, currently, we have traversed the following path [0, 1, 2, 3, 1], and we have two edges for selection, [1,2] and [1,4]. Because node 4 has not been covered in the current traversal, we give priority to [1,4] to accelerate the process to include all nodes in the graph.…”
Section: Inputmentioning
confidence: 99%
“…Compared with HTML4, HTML5 defines more specific input attributes such as telephone number, color, and email address. However, on the other hand, some studies have also presented the security issues affiliated with HTML5 [1][2][3][4][5], especially the injection attacks on the websites [6][7][8][9]. Even though in HTML5 regular users can only enter a valid value through the user interfaces supported by browsers, malicious users can skip the user interface and directly send malformed HTTP requests to the web server.…”
Section: Introductionmentioning
confidence: 99%