메뉴 건너뛰기




Volumn , Issue , 2010, Pages 135-144

A solution for the automated detection of clickjacking attacks

Author keywords

browser plug in; ClickIDS; clickjacking; CSS; HTML IFRAME; javascript; web security

Indexed keywords

AUTOMATED DETECTION; BROWSER PLUG-IN; EFFICIENT DETECTION; EMPIRICAL STUDIES; INTERNET USERS; JAVASCRIPT; MEDIA COVERAGE; MONEY TRANSACTIONS; NOVEL SOLUTIONS; PLUG-INS; WEB PAGE; WEB SECURITY; WEB-BASED ATTACKS;

EID: 77954485076     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1755688.1755706     Document Type: Conference Paper
Times cited : (56)

References (41)
  • 2
  • 4
    • 77954475874 scopus 로고    scopus 로고
    • Myspace. http://www.myspace.com.
    • Myspace
  • 5
    • 77954523221 scopus 로고    scopus 로고
    • Nikto. http://www.cirt.net/nikto2.
    • Nikto
  • 9
    • 77954512863 scopus 로고    scopus 로고
    • xdotool. http://www.semicomplete.com/projects/xdotool/.
    • Xdotool
  • 10
    • 77954501673 scopus 로고    scopus 로고
    • http://www.blogger.com, 2009.
    • (2009)
  • 11
    • 77954461257 scopus 로고    scopus 로고
    • Alexa Internet, Inc. Alexa - top sites by category. http://www.alexa.com/ topsites/category/Top/, 2009.
    • (2009) Alexa - Top Sites by Category
  • 19
    • 77954478139 scopus 로고    scopus 로고
    • International Secure Systems Lab. http://anubis.iseclab.org, 2009.
    • (2009)
  • 21
    • 77954467581 scopus 로고    scopus 로고
    • June
    • Jeremiah Grossman. Clickjacking 2017. http://jeremiahgrossman.blogspot. com/2009/06/clickjacking-2017.html, June 2009.
    • (2009) Clickjacking 2017
    • Grossman, J.1
  • 22
    • 33751027156 scopus 로고    scopus 로고
    • Pixy: A static analysis tool for detecting web application vulnerabilities
    • (short paper)
    • N. Jovanovic, C. Kruegel, and E. Kirda. Pixy: A static analysis tool for detecting web application vulnerabilities (short paper). In IEEE Symposium on Security and Privacy, pages 258-263, 2006.
    • (2006) IEEE Symposium on Security and Privacy , pp. 258-263
    • Jovanovic, N.1    Kruegel, C.2    Kirda, E.3
  • 27
    • 77954465167 scopus 로고    scopus 로고
    • 01
    • Microsoft. IE8 Clickjacking Defense. http://blogs.msdn.com/ie/archive/ 2009/01/27/ie8-security-part-vii-clickjacking-defenses. aspx, 01 2009.
    • (2009) IE8 Clickjacking Defense
  • 30
    • 77954505906 scopus 로고    scopus 로고
    • Mozilla Foundation. https://bugzilla.mozilla.org/show-bug.cgi?id=154957, 2002.
    • (2002)
  • 36
    • 33750356750 scopus 로고    scopus 로고
    • Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
    • Y.-M. Wang, D. Beck, X. Jiang, and R. Roussev. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In IN NDSS, 2006.
    • (2006) IN NDSS
    • Wang, Y.-M.1    Beck, D.2    Jiang, X.3    Roussev, R.4
  • 37
    • 35449004893 scopus 로고    scopus 로고
    • Sound and precise analysis of web applications for injection vulnerabilities
    • G. Wassermann and Z. Su. Sound and precise analysis of web applications for injection vulnerabilities. SIGPLAN Not., 42(6):32-41, 2007.
    • (2007) SIGPLAN Not. , vol.42 , Issue.6 , pp. 32-41
    • Wassermann, G.1    Su, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.