19 research outputs found

    Performance Analysis of TFRC and UDP over Mobile-IP Network with Competing Flows

    Get PDF
    This study aimed to conduct a performance analysis of TFRC and UDP over mobile-IP network with competing flows that enables to investigate three major performance metrics such as jitter, throughput, packet loss and packet delay. Two different transport layer protocols have been used in this analysis. As mobility has been the core issue of computing of 21st century, this research aims to contribute to this phenomenon by implementing performance analysis in mobile IP network, where mobile devices (nodes) are moved from access points to access points (AP) in order to exemplify the suitability of TFRC and UDP in wireless networking. Moreover to collect data about crucial performance metrics features. The experiment has been conducted by Network Simulation (NS-2)

    AutoNav: Evaluation and Automatization of Web Navigation Policies

    Get PDF
    Undesired navigation in browsers powers a significant class of attacks on web applications. In a move to mitigate risks associated with undesired navigation, the security community has proposed a standard that gives control to web pages to restrict navigation. The standard draft introduces a new navigate-to directive of the Content Security Policy (CSP). The directive is currently being implemented by mainstream browsers. This paper is a first evaluation of navigate-to, focusing on security, performance, and automatization of navigation policies. We present new vulnerabilities introduced by the directive into the web ecosystem, opening up for attacks such as probing to detect if users are logged in to other websites or have active shopping carts, bypassing third-party cookie blocking, exfiltrating secrets, as well as leaking browsing history. Unfortunately, the directive triggers vulnerabilities even in websites that do not use the directive in their policies. We identify both specification- and implementation-level vulnerabilities and propose countermeasures to mitigate both. To aid developers in configuring navigation policies, we develop and implement AutoNav1, an automated black-box mechanism to infer navigation policies. AutoNav leverages the benefits of origin-wide policies in order to improve security without degrading performance. We evaluate the viability of navigate-to and AutoNav by an empirical study on Alexa\u27s top 10,000 websites

    Automatic Exploit Generation for Web Applications

    No full text
    Web applications are valuable targets for security attacks because of their popularity and the sensitive data that they handle (e.g., credit card data, medical records, and personal information). Vulnerabilities that can be exploited in these applications may have potentially catastrophic effects in terms of financial losses to the online enterprise as well as privacy losses to the consumer. Therefore, the security of web applications is critically important for both end users and online enterprises. Several approaches exist for analyzing the security of modern web applications. These approaches use a series of analysis techniques to identify vulnerabilities such as SQL Injection (SQLI) and Cross-Site Scripting (XSS). However, these analysis techniques are susceptible to false alarms, and therefore require manual efforts to check whether each one of the reported vulnerabilities is indeed exploitable. Automatic exploit generation approaches take a further step and try to include methods for automatically verifying that vulnerabilities are real by generating concrete exploits. Here, an exploit is a that a reported vulnerability is indeed exploitable. Identifying exploitable vulnerabilities helps web developers prioritize their efforts on fixing those critical bugs first. The research community is aware of the need for automated techniques that construct exploits for modern web applications. However, prior research works in this area do not scale to find deep vulnerabilities and cannot handle large and complex web applications. Several challenges contribute to this problem. Mainly, these challenges arise from the unique characteristics of modern web applications such as their complex workflows, multi-module nature, interposed user input, and multi-tier architectures. This dissertation presents an effort to secure web applications by automatically generating exploits that validate the existence and exploitability of vulnerabilities. It covers research efforts that contribute to our overall goal of providing an automatic exploit generation solution that scales to large, complex, and dynamic web applications. First, the dissertation describes an approach that automatically generates injection exploits that span several HTTP requests. Our approach develops precise models of application workflows, database schemas, and native functions to achieve the goal of automatic exploit generation. To assess the effectiveness of our approach, we evaluated it on several web applications of different complexities. The experimental results demonstrate that our approach can overcome the challenges of modern web applications by successfully generating first- and second-order exploits for them. Second, we present an exploit construction approach that overcomes the challenges posed by the dynamic nature of web applications. Our approach is based on combining dynamic analysis that is guided by static analysis techniques in order to automatically identify vulnerabilities and build working exploits. We evaluated our system over a codebase of 3.2 million lines of PHP code. Experimental results demonstrate that our system can scale the process of automatic vulnerability analysis and exploit generation to large applications and to multiple classes of vulnerabilities. By presenting the results of both systems, this thesis demonstrates an automated exploit generation approach that scales to large, complex, and dynamic web applications despite the complexities associated with the automated analysis of modern web applications

    Improving Textual Emotion Recognition Based on Intra- and Inter-Class Variation

    No full text

    SpanEmo: Casting Multi-label Emotion Classification as Span-prediction

    No full text
    Emotion recognition (ER) is an important task in Natural Language Processing (NLP), due to its high impact in real-world applications from health and well-being to author profiling, consumer analysis and security. Current approaches to ER, mainly classify emotions independently without considering that emotions can co-exist. Such approaches overlook potential ambiguities, in which multiple emotions overlap. We propose a new model "SpanEmo" casting multi-label emotion classification as span-prediction, which can aid ER models to learn associations between labels and words in a sentence. Furthermore, we introduce a loss function focused on modelling multiple co-existing emotions in the input sentence. Experiments performed on the SemEval2018 multi-label emotion data over three language sets (i.e., English, Arabic and Spanish) demonstrate our method's effectiveness. Finally, we present different analyses that illustrate the benefits of our method in terms of improving the model performance and learning meaningful associations between emotion classes and words in the sentence.Comment: 12 pages, 4 figures, 7 tables, accepted at EACL202
    corecore