[go: up one dir, main page]

Klein, 2025 - Google Patents

Web cache poisoning attacks

Klein, 2025

Document ID
2001519710824213354
Author
Klein A
Publication year
Publication venue
Encyclopedia of Cryptography, Security and Privacy

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
    • H04L67/2842Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for storing data temporarily at an intermediate stage, e.g. caching
    • H04L67/2847Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for storing data temporarily at an intermediate stage, e.g. caching involving pre-fetching or pre-delivering data based on network characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/02Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]

Similar Documents

Publication Publication Date Title
Barreto et al. Whirlpool
Lodderstedt et al. OAuth 2.0 threat model and security considerations
US9621341B2 (en) Anonymous verifiable public key certificates
CN103944900B (en) It is a kind of that attack prevention method and its device are asked across station based on encryption
US8683607B2 (en) Method of web service and its apparatus
Singh et al. OAuth 2.0: Architectural design augmentation for mitigation of common security vulnerabilities
Beltran Characterization of web single sign-on protocols
Alhaidary et al. Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol
Klein Web cache poisoning attacks
Chu et al. Ticket transparency: Accountable single sign-on with privacy-preserving public logs
Paquin U-prove technology overview v1. 1
Maidine et al. Cloud identity management mechanisms and issues
Li et al. Mitigating csrf attacks on oauth 2.0 systems
Chadwick Threat modelling for active directory
Jackson Web 2.0 Security and Privacy
Durfee Wiener, Boneh–Durfee, and May Attacks on the RSA Public Key Cryptosystem
Forte Web Security Auditing
Deeptha et al. Extending OpenID connect towards mission critical applications
AlJanah An Interaction based Multi-Factor Multi-Level Authentication Framework for IoT Environments
Dietz et al. Hardening Persona-Improving Federated Web Login.
Kumar et al. Realization of threats and countermeasure in Semantic Web services
CN113591063A (en) Security protection method and system for single sign-on jump link
Schwenk et al. The power of recognition: secure single sign-on using TLS channel bindings
Hosseyni et al. Formal Security Analysis of the OpenID Financial-grade API 2.0
Maidine et al. Key Mechanisms and Emerging Issues in Cloud Identity Systems