Cross-site request forgery

Results: 270



#Item
51All Your Screens are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API Yuan Tian∗ , Ying-Chuan Liu‡ , Amar Bhosale† , Lin-Shung Huang∗ ,Patrick Tague† ,Collin Jackson∗ ∗ {yuan.tian,  Carnegie Me

All Your Screens are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API Yuan Tian∗ , Ying-Chuan Liu‡ , Amar Bhosale† , Lin-Shung Huang∗ ,Patrick Tague† ,Collin Jackson∗ ∗ {yuan.tian, Carnegie Me

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-21 13:48:10
52CS 155: Spring 2014 June 9, 2014 CS 155 Final Exam This exam is open book and open notes. You may use course notes and documents that you have stored on a laptop, but you may NOT use the network connection on your laptop

CS 155: Spring 2014 June 9, 2014 CS 155 Final Exam This exam is open book and open notes. You may use course notes and documents that you have stored on a laptop, but you may NOT use the network connection on your laptop

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-05-18 15:16:38
53Web Application Scan  Document Revision Initial Report Prepared By:  AppCheck-NG

Web Application Scan Document Revision Initial Report Prepared By: AppCheck-NG

Add to Reading List

Source URL: appcheck-ng.com

Language: English - Date: 2014-09-08 05:22:28
54Ghosts	
  of	
  XSS	
  Past,	
  Present	
   and	
  Future.	
   	
      Jim	
  Manico	
  

Ghosts  of  XSS  Past,  Present   and  Future.       Jim  Manico  

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-09-26 17:07:30
55PREVOTY RUNTIME APPLICATION SECURITY Applications, and the databases that they access, are at the heart of most enterprises business and hackers know that’s where the money is, including usernames, passwords, personal

PREVOTY RUNTIME APPLICATION SECURITY Applications, and the databases that they access, are at the heart of most enterprises business and hackers know that’s where the money is, including usernames, passwords, personal

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:18
56PREVOTY RUNTIME APPLICATION SECURITY Applications, and the databases that they access, are at the heart of most enterprises business and hackers know that’s where the money is, including usernames, passwords, personal

PREVOTY RUNTIME APPLICATION SECURITY Applications, and the databases that they access, are at the heart of most enterprises business and hackers know that’s where the money is, including usernames, passwords, personal

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2015-06-04 23:45:18
57Toward Principled Browser Security Edward Z. Yang1 Deian Stefan1 John Mitchell1 David Mazi`eres1 Petr Marchenko2 Brad Karp2 1 Stanford University 2 University College London A BSTRACT To ensure the confidentiality and in

Toward Principled Browser Security Edward Z. Yang1 Deian Stefan1 John Mitchell1 David Mazi`eres1 Petr Marchenko2 Brad Karp2 1 Stanford University 2 University College London A BSTRACT To ensure the confidentiality and in

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-12-02 06:10:56
58Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2) Shreeraj Shah Blueinfy Solutions Pvt. Ltd.

Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2) Shreeraj Shah Blueinfy Solutions Pvt. Ltd.

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-09-26 16:09:08
59Prevoty Plug-ins: Application Security for Legacy Applications The frequency and impact of hacking attempts against websites and applications continue to rise to unprecedented levels, creating significant challenges for

Prevoty Plug-ins: Application Security for Legacy Applications The frequency and impact of hacking attempts against websites and applications continue to rise to unprecedented levels, creating significant challenges for

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:13
60Prevoty Plug-ins: Application Security for Legacy Applications The frequency and impact of hacking attempts against websites and applications continue to rise to unprecedented levels, creating significant challenges for

Prevoty Plug-ins: Application Security for Legacy Applications The frequency and impact of hacking attempts against websites and applications continue to rise to unprecedented levels, creating significant challenges for

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2015-06-04 23:45:13