Back to Results
First PageMeta Content
Cyberwarfare / DNS rebinding / DNS hijacking / DNS spoofing / Computer network security / Computing / Computer security


Protecting Browsers from DNS Rebinding Attacks COLLIN JACKSON, ADAM BARTH, ANDREW BORTZ, WEIDONG SHAO, and DAN BONEH Stanford University
Add to Reading List

Document Date: 2009-08-02 18:55:07


Open Document

File Size: 654,61 KB

Share Result on Facebook

City

New York / /

Company

Adobe / ACM Inc. / Microsoft / /

Country

United States / /

Currency

USD / /

/

Facility

Penn Plaza / LiveConnect Opera / Stanford University / Serra Mall / using LiveConnect / /

/

IndustryTerm

Web content / Web users / Internet Settings / Web advertisement / Web browsers / Web content open TCP connections / universal cross-site / honest server / to both network / Web content access network sockets / internal services / attacker Web content / remote server / Web servers / target server / malicious Web / Web traffic / malicious Web site / browser technology / large-scale bot network / Web server / Internet Explorer / /

OperatingSystem

FreeBSD / Microsoft Windows / /

Organization

National Science Foundation / U.S. Department of Homeland Security / LiveConnect Opera / Department of Computer Science / Stanford University / Stanford University DNS / /

Person

DAN BONEH / COLLIN JACKSON / Web / ANDREW BORTZ / ADAM BARTH / /

/

Position

Protection General / Dean / corresponding author / General / /

Product

Flash Player / /

ProgrammingLanguage

Java / Cascading Style Sheets / HTML / XML / JavaScript / /

ProvinceOrState

New York / /

SportsLeague

Stanford University / /

Technology

Virtual Machine / XML / HTTP protocol / browser technology / HTML / UDP / Uniform Resource Locator / DNS / Java / firewall / HTTP / DOM / Document Object Model / Flash / Web server / /

URL

http /

SocialTag