CORSICA: Cross-Origin Web Service Identification
暂无分享,去创建一个
Damian Poddebniak | Sebastian Schinzel | Thorsten Holz | Christian Dresen | Fabian Ising | Tobias Kappert | D. Poddebniak | Christian Dresen | Fabian Ising | Sebastian Schinzel | Thorsten Holz | Tobias Kappert
[1] Arturs Lavrenovs,et al. HTTP security headers analysis of top one million websites , 2018, 2018 10th International Conference on Cyber Conflict (CyCon).
[2] Mohd. Shadab Siddiqui,et al. Cross site request forgery: A common web application weakness , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[3] Jörg Schwenk,et al. Same-Origin Policy: Evaluation in Modern Browsers , 2017, USENIX Security Symposium.
[4] Collin Jackson,et al. Robust defenses for cross-site request forgery , 2008, CCS.
[5] Michal Zalewski. The Tangled Web: A Guide to Securing Modern Web Applications , 2011 .
[6] Anneli Folkesson,et al. World Wide Web Consortium (W3C) , 2005 .
[7] Mitsuaki Akiyama,et al. Characterizing Obfuscated JavaScript Using Abstract Syntax Trees: Experimenting with Malicious Scripts , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.
[8] Paul Francis,et al. The IP Network Address Translator (NAT) , 1994, RFC.
[9] Marin Golub,et al. A method for identifying Web applications , 2009, International Journal of Information Security.
[10] Felix C. Freiling,et al. Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications , 2011, SEC.
[11] Adam Barth,et al. The Web Origin Concept , 2011, RFC.
[12] Dan Wing,et al. Session Traversal Utilities for NAT (STUN) , 2020, RFC.
[13] Markus Jakobsson,et al. Drive-By Pharming , 2007, ICICS.
[14] Dan Wing,et al. Session Traversal Utilities for NAT (STUN) , 2020 .
[15] Ashraf Matrawy,et al. A classification of web browser fingerprinting techniques , 2015, 2015 7th International Conference on New Technologies, Mobility and Security (NTMS).
[16] Martin Johns,et al. On JavaScript Malware and related threats , 2008, Journal in Computer Virology.
[17] Ben Stock,et al. The Unexpected Dangers of Dynamic JavaScript , 2015, USENIX Security Symposium.
[18] Nick Feamster,et al. Web-based Attacks to Discover and Control Local IoT Devices , 2018, IoT S&P@SIGCOMM.