enter search term and/or author name
Looks Like Eve: Exposing Insider Threats Using Eye Movement Biometrics
Simon Eberz, Kasper B. Rasmussen, Vincent Lenders, Ivan Martinovic
Article No.: 1
We introduce a novel biometric based on distinctive eye movement patterns. The biometric consists of 20 features that allow us to reliably distinguish users based on differences in these patterns. We leverage this distinguishing power along with...
How to Train Your Browser: Preventing XSS Attacks Using Contextual Script Fingerprints
Dimitris Mitropoulos, Konstantinos Stroggylos, Diomidis Spinellis, Angelos D. Keromytis
Article No.: 2
Cross-Site Scripting (XSS) is one of the most common web application vulnerabilities. It is therefore sometimes referred to as the “buffer overflow of the web.” Drawing a parallel from the current state of practice in preventing...
From buying books to finding the perfect partner, we share our most intimate wants and needs with our favourite online systems. But how far should we accept promises of privacy in the face of personalized profiling? In particular, we ask how we...