Cross-site request forgery

Results: 270



#Item
31Indirect File Leaks in Mobile Applications Daoyuan Wu and Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong {csdwu, csrchang}@comp.polyu.edu.hk

Indirect File Leaks in Mobile Applications Daoyuan Wu and Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong {csdwu, csrchang}@comp.polyu.edu.hk

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-20 23:58:45
32The Unexpected Dangers of Dynamic JavaScript Sebastian Lekies Ruhr-University Bochum   Ben Stock

The Unexpected Dangers of Dynamic JavaScript Sebastian Lekies Ruhr-University Bochum Ben Stock

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
33Computer security / Computer network security / Cryptography / E-commerce / Secure communication / Cross-site request forgery / SQL injection / Password / Salt / Transport Layer Security / Application security / OWASP

Application Security Checklist V1.0 Document Audience Application Developers

Add to Reading List

Source URL: security.uci.edu

Language: English - Date: 2016-02-23 10:01:01
34A Trusted UI for the Mobile Web Bastian Braun1 , Johannes Koestler1 , Joachim Posegga1 , and Martin Johns2 1 Institute of IT Security and Security Law (ISL), University of Passau, Germany 2

A Trusted UI for the Mobile Web Bastian Braun1 , Johannes Koestler1 , Joachim Posegga1 , and Martin Johns2 1 Institute of IT Security and Security Law (ISL), University of Passau, Germany 2

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
35Talking to Strangers Without Taking Their Candy: Isolating Proxied Content Adrienne Felt, Pieter Hooimeijer, David Evans, Westley Weimer University of Virginia {felt, pieter, evans, weimer}@cs.virginia.edu

Talking to Strangers Without Taking Their Candy: Isolating Proxied Content Adrienne Felt, Pieter Hooimeijer, David Evans, Westley Weimer University of Virginia {felt, pieter, evans, weimer}@cs.virginia.edu

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2008-03-19 15:40:17
36Institute of Distributed Systems  Ulm University Preparation Document

Institute of Distributed Systems Ulm University Preparation Document

Add to Reading List

Source URL: cmichi.github.io

Language: English - Date: 2014-07-09 05:38:52
37Lightweight Server Support for Browser-Based CSRF Protection Alexei Czeskis University of Washington  Alexander Moshchuk

Lightweight Server Support for Browser-Based CSRF Protection Alexei Czeskis University of Washington Alexander Moshchuk

Add to Reading List

Source URL: www2013.wwwconference.org

Language: English - Date: 2014-07-21 08:47:06
38Security / Computing / Prevention / Computer security / Computer network security / Cryptography / E-commerce / Secure communication / Cross-site request forgery / SQL injection / Password / Salt

Application Security Checklist V1.0 Document Audience Application Developers

Add to Reading List

Source URL: www.security.uci.edu

Language: English - Date: 2016-02-23 10:01:01
39FINAL REPORTCookie Analysis

FINAL REPORTCookie Analysis

Add to Reading List

Source URL: fbcdn-dragon-a.akamaihd.net

Language: English - Date: 2013-07-09 14:28:00
40Business Logic Security Ilia Alshanetsky @iliaa https://joind.in/14863  whois: Ilia Alshanetsky

Business Logic Security Ilia Alshanetsky @iliaa https://joind.in/14863 whois: Ilia Alshanetsky

Add to Reading List

Source URL: ilia.ws

Language: English - Date: 2015-09-26 04:23:31