Rankothge et al., 2020 - Google Patents
Identification and mitigation tool for cross-site request forgery (csrf)Rankothge et al., 2020
- Document ID
- 8399852552070021741
- Author
- Rankothge W
- Randeniya S
- Publication year
- Publication venue
- 2020 IEEE 8th R10 Humanitarian Technology Conference (R10-HTC)
External Links
Snippet
Most organizations use web applications for sharing resources and communication via the internet and information security is one of the biggest concerns in most organizations. Web applications are becoming vulnerable to threats and malicious attacks every day, which lead …
- 230000000116 mitigating 0 title abstract description 21
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103944900B (en) | It is a kind of that attack prevention method and its device are asked across station based on encryption | |
Li et al. | Analysing the Security of Google’s implementation of OpenID Connect | |
Nagpure et al. | Vulnerability assessment and penetration testing of web application | |
CN107634967B (en) | A CSRFToken defense system and method for CSRF attack | |
Li et al. | Security issues in OAuth 2.0 SSO implementations | |
US8904521B2 (en) | Client-side prevention of cross-site request forgeries | |
Shrivastava et al. | XSS vulnerability assessment and prevention in web application | |
US20090228780A1 (en) | Identification of and Countermeasures Against Forged Websites | |
Rankothge et al. | Identification and mitigation tool for cross-site request forgery (csrf) | |
Bojjagani et al. | PhishPreventer: a secure authentication protocol for prevention of phishing attacks in mobile environment with formal verification | |
Farah et al. | Assessment of vulnerabilities of web applications of Bangladesh: A case study of XSS & CSRF | |
Ravindran et al. | A Review on Web Application Vulnerability Assessment and Penetration Testing. | |
Singh | Review of e-commerce security challenges | |
Lewandowski et al. | Spidertrap—An innovative approach to analyze activity of internet bots on a website | |
Parimala et al. | Efficient web vulnerability detection tool for sleeping giant-cross site request forgery | |
Lungu et al. | Optimizing Anti-Phishing Solutions Based on User Awareness, Education and the Use of the Latest Web Security Solutions. | |
Takamatsu et al. | Automated detection of session management vulnerabilities in web applications | |
CN107682346B (en) | A fast positioning and identification system and method for CSRF attack | |
Muñoz-Arteaga et al. | Misuse pattern: spoofing web services | |
Gao et al. | A research of security in website account binding | |
Knickerbocker et al. | Humboldt: A distributed phishing disruption system | |
Satter et al. | Vulnerabilities assessment of emerging web-based services in developing countries | |
Izagirre | Deception strategies for web application security: application-layer approaches and a testing platform | |
Kour | A Review on Cross-Site Request Forgery and its Defense Mechanism | |
Gupta et al. | Server side protection against cross site request forgery usingcsrf gateway |