Rankothge et al., 2020 - Google Patents
Identification and mitigation tool for cross-site request forgery (csrf)Rankothge et al., 2020
- Document ID
- 8399852552070021741
- Author
- Rankothge W
- Randeniya S
- Publication year
- Publication venue
- 2020 IEEE 8th R10 Humanitarian Technology Conference (R10-HTC)
External Links
Snippet
Most organizations use web applications for sharing resources and communication via the internet and information security is one of the biggest concerns in most organizations. Web applications are becoming vulnerable to threats and malicious attacks every day, which lead …
- 230000000116 mitigating 0 title abstract description 21
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103944900B (en) | It is a kind of that attack prevention method and its device are asked across station based on encryption | |
Li et al. | Analysing the Security of Google’s implementation of OpenID Connect | |
Nagpure et al. | Vulnerability assessment and penetration testing of web application | |
CN107634967B (en) | A CSRFToken defense system and method for CSRF attack | |
US9900346B2 (en) | Identification of and countermeasures against forged websites | |
Li et al. | Security issues in OAuth 2.0 SSO implementations | |
Banu et al. | A comprehensive study of phishing attacks | |
US8904521B2 (en) | Client-side prevention of cross-site request forgeries | |
Rankothge et al. | Identification and mitigation tool for cross-site request forgery (csrf) | |
Ravindran et al. | A Review on Web Application Vulnerability Assessment and Penetration Testing. | |
Bojjagani et al. | PhishPreventer: a secure authentication protocol for prevention of phishing attacks in mobile environment with formal verification | |
Farah et al. | Assessment of vulnerabilities of web applications of Bangladesh: A case study of XSS & CSRF | |
Purkait | Examining the effectiveness of phishing filters against DNS based phishing attacks | |
Singh | Review of e-commerce security challenges | |
Lewandowski et al. | Spidertrap—An innovative approach to analyze activity of internet bots on a website | |
Parimala et al. | Efficient web vulnerability detection tool for sleeping giant-cross site request forgery | |
Lungu et al. | Optimizing Anti-Phishing Solutions Based on User Awareness, Education and the Use of the Latest Web Security Solutions. | |
Takamatsu et al. | Automated detection of session management vulnerabilities in web applications | |
CN107682346B (en) | A fast positioning and identification system and method for CSRF attack | |
Gao et al. | A research of security in website account binding | |
Kour | A Study On Cross-Site Request Forgery Attack And Its Prevention Measures | |
Muñoz-Arteaga et al. | Misuse pattern: spoofing web services | |
Knickerbocker et al. | Humboldt: A distributed phishing disruption system | |
Satter et al. | Vulnerabilities assessment of emerging web-based services in developing countries | |
Izagirre | Deception strategies for web application security: application-layer approaches and a testing platform |