HERBS: Histological E-data Registration in rodent Brain Spaces

Kavli Affiliate: Jonathan Whitlock, Jingyi Guo, Pearl Saldanha | Authors: Jingyi Guo Fuglstad, Pearl Saldanha, Jacopo Paglia and Jonathan R. Whitlock | Summary: Abstract Recording technologies for rodents have seen huge advances in the last decade, allowing users to sample thousands of neurons simultaneously from multiple brain regions. This has prompted the need for digital […]


Continue.. HERBS: Histological E-data Registration in rodent Brain Spaces

Mysterious Dust-emitting Object Orbiting TIC 400799224

Kavli Affiliate: Saul Rappaport | First 5 Authors: Brian P. Powell, Veselin Kostov, Saul Rappaport, Andrei Tokovinin, Avi Shporer | Summary: We report the discovery of a unique object of uncertain nature — but quite possibly a disintegrating asteroid or minor planet — orbiting one star of the widely separated binary TIC 400799224. We initially […]


Continue.. Mysterious Dust-emitting Object Orbiting TIC 400799224

Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations

Kavli Affiliate: Feng Yuan | First 5 Authors: Tamjid Al Rahat, Yu Feng, Yuan Tian, , | Summary: OAuth protocols have been widely adopted to simplify user authentication and service authorization for third-party applications. However, little effort has been devoted to automatically checking the security of the libraries that service providers widely use. In this […]


Continue.. Cerberus: Query-driven Scalable Vulnerability Detection in OAuth Service Provider Implementations

Cerberus: Query-driven Scalable Security Checking for OAuth Service Provider Implementations

Kavli Affiliate: Feng Yuan | First 5 Authors: Tamjid Al Rahat, Yu Feng, Yuan Tian, , | Summary: OAuth protocols have been widely adopted to simplify user authentication and service authorization for third-party applications. However, little effort has been devoted to automatically checking the security of the libraries that service providers widely use. In this […]


Continue.. Cerberus: Query-driven Scalable Security Checking for OAuth Service Provider Implementations

OAuthShield: Efficient Security Checking for OAuth Service Provider Implementations

Kavli Affiliate: Feng Yuan | First 5 Authors: Tamjid Al Rahat, Yu Feng, Yuan Tian, , | Summary: OAuth protocols have been widely adopted to simplify user authentication and service authorization for third-party applications. However, little effort has been devoted to automatically checking the security of libraries that are widely used by service providers. In […]


Continue.. OAuthShield: Efficient Security Checking for OAuth Service Provider Implementations