KENT, C. Draft proposal for
tweakable narrow-block encryption.
https://siswg.net/docs/LRW-AES-10-19-2004.pdf, 2004
S. Fogie, J. Grossman, R. Hansen, A. Rager, and
P. D. Petkov. XSS Attacks: Cross Site Scripting Exploits and Defense.
Syngress, 2011.
D. Pogue. Remember all those
passwords? no need. http://nyti.ms/10ZhXgq, 2013.[33] Roboform everywhere.
http://www.roboform.com/everywhere.
BONEH, D., DURFEE, G., AND
FRANKEL, Y. An attack on RSA given a small fraction of the private key bits. In
Advances in Cryptology – ASIACRYPT ’98 (1998), pp. 25–34.
A. Barth, C. Jackson, and J. C.
Mitchell. Robust defenses for cross-site request forgery. In Proc. of ACM
Conference on Computer and Communications Security, 2008.
DYER, J. G., LINDEMANN, M., PEREZ, R., SAILER,
R., VAN DOORN, L., SMITH, S. W., AND WEINGART, S. Building the IBM 4758 secure
coprocessor. Computer 34 (Oct. 2001), 57–66.
GUTMANN, P. Secure deletion of
data from magnetic and solid state memory. In Proc. 6th USENIX Security
Symposium (July 1996), pp. 77–90.
LISKOV, M., RIVEST, R. L., AND WAGNER, D. Tweakable
block ciphers. In Advances in Cryptology – CRYPTO 2002 (2002), pp. 31–46.
P. Barham, B. Dragovic, K. Fraser, S. Hand, T.
Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of
Virtualization. In SOSP, pages 164–177, 2003.
A. Vasudevan and R. Yerraballi.
Cobra: Fine-grained Malware Analysis using Stealth Localized-executions. In
S&P (Oakland), pages 264–279, 2006.
C. Willems, T. Holz, and F.
Freiling. Toward Automated Dynamic Malware Analysis Using
CWSandbox. IEEE Security and
Privacy, 5(2), 2007.