Cross-site request forgery

Results: 270



#Item
61Computing / Security / Network protocols / OWASP / HTTP / Cross-site request forgery / Cross-site scripting / HTTP cookie / Web application security / Computer security / Cyberwarfare / Computer network security

OWASP RUBY ON RAILS SECURITY GUIDE 2009 V2.0 © OWASP Foundation This document is licensed under the Creative Commons Attribution-Share Alike 3.0 license. You must attribute your version to the OWASP Testing or

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:27
62Cross-site request forgery / Social media / Phishing / Malware / Social networking service / Social engineering / Internet privacy / Identity theft / Social login / Computing / Technology / Cybercrime

Social network security A SysSec Whitepaper∗ September 4, 2012 1

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2012-09-04 11:23:26
63HTTP / Scripting languages / Cross-site scripting / Cross-site request forgery / JavaScript / HTTP cookie / Same origin policy / World Wide Web / Web server / Software / Computing / Computer network security

SOMA: Mutual Approval for Included Content in Web Pages Terri Oda Glenn Wurster P. C. van Oorschot Anil Somayaji Carleton Computer Security Lab School of Computer Science Carleton University, Canada

Add to Reading List

Source URL: terri.zone12.com

Language: English - Date: 2008-11-02 21:28:43
64Cross-site scripting / Vulnerability / SQL injection / Application security / Cross-site request forgery / Cyberwarfare / Computer security / Failure

WhiteHat Website Security Statistic Report Spring 2010, 9th Edition 9th edition Introduction

Add to Reading List

Source URL: www.whitehatsec.com

Language: English - Date: 2015-05-26 18:12:11
65Web development / JavaScript / HTTP / Ajax / Cross-site request forgery / HTTP cookie / Session / NoScript / XMLHttpRequest / Computing / World Wide Web / Software

Towards stateless, client-side driven Cross-Site Request Forgery protection for Web applications Sebastian Lekies, Walter Tighzert, and Martin Johns SAP Research fi Abstract: Cross-site request f

Add to Reading List

Source URL: subs.emis.de

Language: English - Date: 2013-10-04 11:44:23
66Cyberwarfare / Internet privacy / Cross-site scripting / HTTP cookie / URL redirection / OpenID / PayPal / Computing / Computer security / Cross-site request forgery

Automatic and Precise Client-Side Protection against CSRF Attacks Philippe De Ryck, Lieven Desmet, Wouter Joosen, and Frank Piessens IBBT-DistriNet Katholieke Universiteit Leuven 3001 Leuven, Belgium

Add to Reading List

Source URL: lirias.kuleuven.be

Language: English
67Cross-site scripting / FTP clients / News aggregators / Computer network security / HTTP cookie / Internet Explorer / Vulnerability / Same origin policy / Cross-site request forgery / Computer security / Cyberwarfare / Computing

Internet Explorer 11 vulnerability allows policy bypass

Add to Reading List

Source URL: techxplore.com

Language: English - Date: 2015-05-28 21:28:13
68Cyberwarfare / Cross-site scripting / Internet privacy / Web development / HTTP cookie / Web server / Web application framework / Hypertext Transfer Protocol / Cross-application scripting / World Wide Web / Computing / Cross-site request forgery

Preparing for the Cross Site Request Forgery Defense Presentation Handout and Reference By Chuck Willis – Presented at Black Hat Briefings DC 2008 on February 20, 2008

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
69Cross-site scripting / HTTP / HTTP cookie / JavaScript / SQL injection / Form / Cross-site request forgery / Code injection / Cyberwarfare / Computing / Computer security

The Anato my of Cross Site Scripting Anatomy, Discovery, Attack, Exploitation by Gavin Zuchlinski ( ) http://libox.net/ November 5, 2003

Add to Reading List

Source URL: www.net-security.org

Language: English - Date: 2003-11-06 15:38:22
70Cyberwarfare / Computer security / Internet privacy / Session fixation / HTTP cookie / Cross-site request forgery / Session / Cross-site scripting / Stateless protocol / Computing / Network protocols / HTTP

Serene: Self-Reliant Client-Side Protection against Session Fixation? Philippe De Ryck, Nick Nikiforakis, Lieven Desmet, Frank Piessens, and Wouter Joosen IBBT-DistriNet, KU Leuven, 3001 Leuven, Belgium {firstname.lastna

Add to Reading List

Source URL: lirias.kuleuven.be

Language: English
UPDATE