Klein, 2025 - Google Patents
Web cache poisoning attacksKlein, 2025
- Document ID
- 2001519710824213354
- Author
- Klein A
- Publication year
- Publication venue
- Encyclopedia of Cryptography, Security and Privacy
External Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/28—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
- H04L67/2842—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for storing data temporarily at an intermediate stage, e.g. caching
- H04L67/2847—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for storing data temporarily at an intermediate stage, e.g. caching involving pre-fetching or pre-delivering data based on network characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/02—Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Barreto et al. | Whirlpool | |
Lodderstedt et al. | OAuth 2.0 threat model and security considerations | |
US9621341B2 (en) | Anonymous verifiable public key certificates | |
CN103944900B (en) | It is a kind of that attack prevention method and its device are asked across station based on encryption | |
US8683607B2 (en) | Method of web service and its apparatus | |
Singh et al. | OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities | |
Beltran | Characterization of web single sign-on protocols | |
Alhaidary et al. | Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol | |
Klein | Web cache poisoning attacks | |
Chu et al. | Ticket transparency: Accountable single sign-on with privacy-preserving public logs | |
Paquin | U-prove technology overview v1. 1 | |
Maidine et al. | Cloud identity management mechanisms and issues | |
Li et al. | Mitigating csrf attacks on oauth 2.0 systems | |
Chadwick | Threat modelling for active directory | |
Jackson | Web 2.0 Security and Privacy | |
Durfee | Wiener, Boneh–Durfee, and May Attacks on the RSA Public Key Cryptosystem | |
Forte | Web Security Auditing | |
Deeptha et al. | Extending OpenID connect towards mission critical applications | |
AlJanah | An Interaction based Multi-Factor Multi-Level Authentication Framework for IoT Environments | |
Dietz et al. | Hardening Persona-Improving Federated Web Login. | |
Kumar et al. | Realization of threats and countermeasure in Semantic Web services | |
CN113591063A (en) | Security protection method and system for single sign-on jump link | |
Schwenk et al. | The power of recognition: secure single sign-on using TLS channel bindings | |
Hosseyni et al. | Formal Security Analysis of the OpenID Financial-grade API 2.0 | |
Maidine et al. | Key Mechanisms and Emerging Issues in Cloud Identity Systems |