SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting
暂无分享,去创建一个
Edgar R. Weippl | Thomas Unger | Sebastian Schrittwieser | Markus Huber | Martin Mulazzani | Dominik Fruhwirt | E. Weippl | S. Schrittwieser | Markus Huber | M. Mulazzani | Thomas Unger | Dominik Fruhwirt
[1] Arjen K. Lenstra,et al. Ron was wrong, Whit is right , 2012, IACR Cryptol. ePrint Arch..
[2] Hovav Shacham,et al. Fingerprinting Information in JavaScript Implementations , 2011 .
[3] Georg Carle,et al. The SSL landscape: a thorough analysis of the x.509 PKI using active and passive measurements , 2011, IMC '11.
[4] Edgar R. Weippl,et al. Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites , 2010, SEC.
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] Dirk Grunwald,et al. Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.
[7] Eric Wustrow,et al. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices , 2012, USENIX Security Symposium.
[8] Christopher Krügel,et al. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis , 2007, NDSS.
[9] Edgar R. Weippl,et al. Tor HTTP Usage and Information Leakage , 2010, Communications and Multimedia Security.
[10] Dag Arne Osvik,et al. MD5 considered harmful today, creating a rogue CA certificate , 2008 .
[11] Martin Johns. SessionSafe: Implementing XSS Immune Session Handling , 2006, ESORICS.
[12] John C. Mitchell,et al. Third-Party Web Tracking: Policy and Technology , 2012, 2012 IEEE Symposium on Security and Privacy.
[13] Christopher Krügel,et al. Noxes: a client-side solution for mitigating cross-site scripting attacks , 2006, SAC '06.
[14] Hovav Shacham,et al. Pixel Perfect : Fingerprinting Canvas in HTML 5 , 2012 .
[15] E. Weippl,et al. Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting , 2013 .
[16] Christopher Krügel,et al. A Practical Attack to De-anonymize Social Network Users , 2010, 2010 IEEE Symposium on Security and Privacy.
[17] E. Weippl,et al. Efficient Browser Identification with JavaScript Engine Fingerprinting , 2011 .
[18] Ben Adida,et al. Sessionlock: securing web sessions against eavesdropping , 2008, WWW.
[19] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[20] Claude Castelluccia,et al. On the uniqueness of Web browsing history patterns , 2014, Ann. des Télécommunications.
[21] Martín Abadi,et al. Host Fingerprinting and Tracking on the Web: Privacy and Security Implications , 2012, NDSS.
[22] Wouter Joosen,et al. SessionShield: Lightweight Protection against Session Hijacking , 2011, ESSoS.
[23] Neal Leavitt,et al. Internet Security under Attack: The Undermining of Digital Certificates , 2011, Computer.
[24] Peter Eckersley,et al. How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.
[25] Gordon Fyodor Lyon,et al. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .
[26] Hovav Shacham,et al. When private keys are public: results from the 2008 Debian OpenSSL vulnerability , 2009, IMC '09.
[27] Dan Boneh,et al. SessionJuggler: secure web login from an untrusted terminal using session hijacking , 2012, WWW.