Search results for "XSS"
showing 2 items of 2 documents
Stopping injection attacks with code and structured data
2018
Injection attacks top the lists of the most harmful software vulnerabilities. Injection vulnerabilities are both commonplace and easy to exploit, which makes development of injection protection schemes important. In this article, we show how injection attacks can be practically eliminated through the use of structured data paired with cryptographic verification codes upon transmission. peerReviewed
Optical pulsations from a transitional millisecond pulsar
2017
Weakly magnetic, millisecond spinning neutron stars attain their very fast rotation through a 1E8-1E9 yr long phase during which they undergo disk-accretion of matter from a low mass companion star. They can be detected as accretion-powered millisecond X-ray pulsars if towards the end of this phase their magnetic field is still strong enough to channel the accreting matter towards the magnetic poles. When mass transfer is much reduced or ceases altogether, pulsed emission generated by particle acceleration in the magnetosphere and powered by the rotation of the neutron star is observed, preferentially in the radio and gamma-ray bands. A few transitional millisecond pulsars that swing betwee…