Confused deputy problem

Results: 12



#Item
1Security / Cyberwarfare / Computer security / Hacking / Cross-site request forgery / Cross-site scripting / Confused deputy problem / Common Weakness Enumeration / Directory traversal attack / Vulnerability / Access control / Web framework

Research Report: Mitigating LangSec Problems With Capabilities Nathaniel Wesley Filardo Johns Hopkins University Baltimore, MD

Add to Reading List

Source URL: spw16.langsec.org

Language: English - Date: 2016-06-05 23:38:35
2Capability-based security / Confused deputy problem / Principle of least privilege / Object-capability model / Ambient authority / File descriptor / Privilege / Filename / Computer security / Security / Access control

CS 261 Scribe Notes Matt Finifter October 2, 2008 Administrative • Homework 2 due Monday 10/6

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
3Cross-site request forgery / Computer network security / Cross-site scripting / Confused deputy problem / World Wide Web / Web cache / Vulnerability / Web application security / Cross-application scripting / Cyberwarfare / Computer security / Computing

Preparing for the Cross Site Request Forgery Defense Chuck Willis Black Hat DC 2008 February 20, 2008

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
4Capability-based security / Object-capability model / Access control list / EROS / Confused deputy problem / Ambient authority / Access Control Matrix / C-list / Infrastructure optimization / Security / Computer security / Access control

Capability Myths Demolished Mark S. Miller Combex, Inc.

Add to Reading List

Source URL: www.erights.org

Language: English - Date: 2005-10-31 18:00:51
5Social engineering / Hacking / Clickjacking / Cross-site request forgery / NoScript / Like button / Confused deputy problem / Google Chrome / HTTP cookie / Software / Computing / Cybercrime

ADAPTIVE USER INTERFACE RANDOMIZATION AS AN ANTI-CLICKJACKING STRATEGY Brad Hill Version 1.0, 18 MayAbstract

Add to Reading List

Source URL: www.thesecuritypractice.com

Language: English - Date: 2012-05-19 00:32:46
6Access control / Cross-platform software / CapDesk / Capability-based security / EROS / E / Confused deputy problem / Vulnerability / Java / Computing / Security / Computer security

Combex/Focused Research Topic 5/BAASNK Combex/Focused Research Topic 5/BAASNK Combex/Focused Research Topic 5/BAASNK Combex/Focused Research Topic 5/BAASNK

Add to Reading List

Source URL: www.combex.com

Language: English - Date: 2005-08-18 16:56:47
7Cross-platform software / CapDesk / Java / Sandbox / Malware / Confused deputy problem / Computing / System software / Software

A Security Analysis of the Combex DarpaBrowser Architecture David Wagner Dean Tribble March 4, 2002

Add to Reading List

Source URL: www.combex.com

Language: English - Date: 2005-08-18 16:59:23
8Android Market / Mobile software / Google Chrome / Filesystem permissions / Firefox / Confused deputy problem / Software / Cloud clients / Android

The Effectiveness of Application Permissions Adrienne Porter Felt∗, Kate Greenwood, David Wagner University of California, Berkeley apf, kate eli, [removed] Abstract

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
9Access control / Cross-platform software / Hacking / Confused deputy problem / Access control list / Cross-site request forgery / Access Control Matrix / Filesystem permissions / Capability-based security / Computing / Computer security / Security

ACLs don’t Abstract The ACL model is unable to make correct access decisions for interactions involving more than two principals, since required information is not retained

Add to Reading List

Source URL: waterken.sourceforge.net

Language: English - Date: 2009-04-30 13:16:38
10Access control / Hacking / Confused deputy problem / Access control list / Cross-site request forgery / Access Control Matrix / Filesystem permissions / Capability-based security / Principle of least privilege / Computer security / Computing / Security

ACLs don’t Tyler Close Hewlett-Packard Labs Palo Alto, CA Email: [removed] Abstract

Add to Reading List

Source URL: waterken.sourceforge.net

Language: English - Date: 2009-04-30 13:16:38
UPDATE