Takamatsu et al., 2013 - Google Patents
Automatically checking for session management vulnerabilities in web applicationsTakamatsu et al., 2013
View PDF- Document ID
- 7996917451536484974
- Author
- Takamatsu Y
- Kosuga Y
- Kono K
- Publication year
- Publication venue
- IPSJ Online Transactions
External Links
Snippet
Many web applications employ session management to keep track of visitors' activities across pages and over periods of time. A session is a period of time linked to a visitor, which is initiated when he/she arrives at a web application and it ends when his/her browser is …
- 238000000034 method 0 abstract description 24
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nagpure et al. | Vulnerability assessment and penetration testing of web application | |
Kirda et al. | Noxes: a client-side solution for mitigating cross-site scripting attacks | |
Johari et al. | A survey on web application vulnerabilities (SQLIA, XSS) exploitation and security engine for SQL injection | |
Singh | Analysis of SQL injection detection techniques | |
Ravindran et al. | A Review on Web Application Vulnerability Assessment and Penetration Testing. | |
Shrivastava et al. | XSS vulnerability assessment and prevention in web application | |
Kerschbaum | Simple cross-site attack prevention | |
Sagar et al. | Studying open source vulnerability scanners for vulnerabilities in web applications | |
Nagpal et al. | SECSIX: security engine for CSRF, SQL injection and XSS attacks | |
Rocchetto et al. | Model-based detection of CSRF | |
Takamatsu et al. | Automated detection of session management vulnerabilities in web applications | |
Kollepalli et al. | An Experimental Study on Detecting and Mitigating Vulnerabilities in Web Applications. | |
Farah et al. | SQLi penetration testing of financial Web applications: Investigation of Bangladesh region | |
Noureddine et al. | Security in web 2.0 application development | |
Bhalme et al. | Cyber attack detection and implementation of prevention methods for web application | |
Van Goethem et al. | Clubbing seals: Exploring the ecosystem of third-party security seals | |
Hammoudeh et al. | The study on assessment of security web applications | |
Ofuonye et al. | Securing web-clients with instrumented code and dynamic runtime monitoring | |
Takamatsu et al. | Automatically checking for session management vulnerabilities in web applications | |
Izagirre | Deception strategies for web application security: application-layer approaches and a testing platform | |
Jayaraman et al. | Enforcing request integrity in web applications | |
Kour | A Study On Cross-Site Request Forgery Attack And Its Prevention Measures | |
Almi | Web Server Security and Survey on Web Application Security | |
Musch | Advanced attack and vulnerability scanning for the modern web | |
Akram et al. | Defense Mechanism Using Multilayered Approach and SQL Injection Methods for Web Based Attacks |