Upper Austria University of Applied Sciences

Displaying 1-2 of 2 results

  • White Papers // Jun 2011

    A Framework for On-Device Privilege Escalation Exploit Execution on Android

    Exploits on mobile phones can be used for various reasons; a benign one may be to achieve system-level access on a device that was locked by the manufacturer or service provider (also known as 'Jailbreaking' or 'Rooting'), while potentially malicious reasons are manifold. Independently of the use case, however, a...

    Provided By Upper Austria University of Applied Sciences

  • White Papers // Jul 2009

    An Evaluation of Current Web Application Rewall Capabilities and Techniques

    To protect an organisation from attacks on their IT infrastructure, perimeter firewalls are nowadays means of standard protective measures. Attacks on the application layer (e.g. web applications) cannot be effectively prevented by those systems as HTTP and HTTPS requests usually pass the firewalling mechanisms unaltered and are forwarded directly to...

    Provided By Upper Austria University of Applied Sciences

  • White Papers // Jul 2009

    An Evaluation of Current Web Application Rewall Capabilities and Techniques

    To protect an organisation from attacks on their IT infrastructure, perimeter firewalls are nowadays means of standard protective measures. Attacks on the application layer (e.g. web applications) cannot be effectively prevented by those systems as HTTP and HTTPS requests usually pass the firewalling mechanisms unaltered and are forwarded directly to...

    Provided By Upper Austria University of Applied Sciences

  • White Papers // Jun 2011

    A Framework for On-Device Privilege Escalation Exploit Execution on Android

    Exploits on mobile phones can be used for various reasons; a benign one may be to achieve system-level access on a device that was locked by the manufacturer or service provider (also known as 'Jailbreaking' or 'Rooting'), while potentially malicious reasons are manifold. Independently of the use case, however, a...

    Provided By Upper Austria University of Applied Sciences