-
1
-
-
85080668754
-
-
The Heartbleed Bug. http://heartbleed.com/.
-
-
-
-
3
-
-
85080635388
-
-
AUBOURG, J., SONG, J., STEEN, H. R. M., and VAN KESTEREN, A. XML Http Request (W3C Working Draft). http://www.w3.org/TR/2012/WD-XMLHttpRequest-20121206/.
-
XML Http Request (W3C Working Draft)
-
-
Aubourg, J.1
Song, J.2
Steen, H.R.M.3
Van Kesteren, A.4
-
7
-
-
84914174218
-
Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS
-
BHARGAVAN, K., DELIGNAT-LAVAUD, A., FOURNET, C., PIRONTI, A., and STRUB, P.-Y. Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS. In IEEE SP (Oakland), 2014.
-
(2014)
IEEE SP (Oakland)
-
-
Bhargavan, K.1
Delignat-Lavaud, A.2
Fournet, C.3
Pironti, A.4
Strub, P.-Y.5
-
8
-
-
85180628981
-
Macaroons: Cookies with contextual caveats for decentralized authorization in the cloud
-
BIRGISSON, A., and POLITZ., J. G., ERLINGSSON, U., TALY, A., VRABLE, M., and LENTCZNER, M. Macaroons: Cookies with contextual caveats for decentralized authorization in the Cloud. In NDSS, 2014.
-
(2014)
NDSS
-
-
Birgisson, A.1
Politz, J.G.2
Erlingsson, U.3
Taly, A.4
Vrable, M.5
Lentczner, M.6
-
10
-
-
84881218966
-
SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements
-
CLARK, J., and VAN OORSCHOT, P. C. SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements. In IEEE SP (Oakland), 2013.
-
(2013)
IEEE SP (Oakland)
-
-
Clark, J.1
Van Oorschot, P.C.2
-
13
-
-
84869430752
-
Strengthening user authentication through opportunistic cryptographic identity assertions
-
CZESKIS, A., DIETZ, M., KOHNO, T., WALLACH, D., and BALFANZ, D. Strengthening user authentication through opportunistic cryptographic identity assertions. In CCS, 2012.
-
(2012)
CCS
-
-
Czeskis, A.1
Dietz, M.2
Kohno, T.3
Wallach, D.4
Balfanz, D.5
-
15
-
-
84940397122
-
Origin-bound certificates: A fresh approach to strong client authentication for the web
-
DIETZ, M., CZESKIS, A., BALFANZ, D., and WALLACH, D. S. Origin-bound certificates: A fresh approach to strong client authentication for the web. In USENIX Security, 2012.
-
(2012)
USENIX Security
-
-
Dietz, M.1
Czeskis, A.2
Balfanz, D.3
Wallach, D.S.4
-
16
-
-
84951326658
-
Hardening persona - Improving federated web login
-
DIETZ, M., and WALLACH, D. S. Hardening Persona - Improving federated web login. In NDSS, 2014.
-
(2014)
NDSS
-
-
Dietz, M.1
Wallach, D.S.2
-
17
-
-
85185685058
-
Formalizing and analyzing sender invariance
-
DRIELSMA, P. H., MÖDERSHEIM, S., VIGANÒ, L., and BASIN, D. Formalizing and analyzing sender invariance. In FAST, 2006.
-
(2006)
FAST
-
-
Drielsma, P.H.1
Mödersheim, S.2
Viganò, L.3
Basin, D.4
-
23
-
-
0003415244
-
-
FIELDING, R., GETTYS, J., MOGUL, J., FRYSTYK, H., MAS-INTER, L., LEACH, P., and BERNERS-LEE, T. Hypertext Transfer Protocol - HTTP/1.1 (RFC 2616). http://tools.ietf.org/html/rfc2616, 1999.
-
(1999)
Hypertext Transfer Protocol - HTTP/1.1 (RFC 2616)
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Mas-Inter, L.5
Leach, P.6
Berners-Lee, T.7
-
24
-
-
85080791465
-
-
GOOGLE DEVELOPERS. Minimize request overhead. https://developers.google.com/speed/docs/best-practices/request.
-
Minimize Request Overhead
-
-
-
25
-
-
85080705379
-
-
GOOGLE DEVELOPERS. Optimize caching. https://developers.google.com/speed/docs/best-practices/caching.
-
Optimize Caching
-
-
-
32
-
-
77952370957
-
Dynamic pharming attacks and locked same-origin policies for web browsers
-
KARLOF, C., SHANKAR, U., TYGAR, J. D., and WAGNER, D. Dynamic pharming attacks and locked same-origin policies for web browsers. In CCS, 2007.
-
(2007)
CCS
-
-
Karlof, C.1
Shankar, U.2
Tygar, J.D.3
Wagner, D.4
-
33
-
-
84888083218
-
Accountable key infrastructure: A proposal for a public-key validation infrastructure
-
KIM, T. H.-J., HUANG, L.-S., PERRIG, A., JACKSON, C., AND GLIGOR, V. Accountable Key Infrastructure: A proposal for a public-key validation infrastructure. In WWW, 2013.
-
(2013)
WWW
-
-
Kim, T.H.-J.1
Huang, L.-S.2
Perrig, A.3
Jackson, C.4
Gligor, V.5
-
37
-
-
85080748148
-
-
MARLINSPIKE, M. Convergence. http://convergence.io/.
-
-
-
Marlinspike, M.1
-
39
-
-
85020899354
-
-
MOZILLA DEVELOPER NETWORK. Mixed content. https://developer.mozilla.org/en-US/docs/Security/MixedContent.
-
Mixed Content
-
-
-
40
-
-
41149151731
-
-
MOZILLA DEVELOPER NETWORK. Same-origin policy. https://developer.mozilla.org/en-US/docs/Web/JavaScript/Same_origin_policy_for_JavaScript.
-
Same-origin Policy
-
-
-
41
-
-
84869428407
-
You are what you include: Large-scale evaluation of remote Javascript inclusions
-
NIKIFORAKIS, N., INVERNIZZI, L., KAPRAVELOS, A., VAN ACKER, S., JOOSEN, W., KRUEGEL, C., PIESSENS, F., and VIGNA, G. You are what you include: Large-scale evaluation of remote Javascript inclusions. In CCS, 2012.
-
(2012)
CCS
-
-
Nikiforakis, N.1
Invernizzi, L.2
Kapravelos, A.3
Van Acker, S.4
Joosen, W.5
Kruegel, C.6
Piessens, F.7
Vigna, G.8
-
42
-
-
33745913964
-
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
-
OPPLIGER, R., HAUSER, R., and BASIN, D. SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle. Computer Communications 29, 12 (2006), 2238-2246.
-
(2006)
Computer Communications
, vol.29
, Issue.12
, pp. 2238-2246
-
-
Oppliger, R.1
Hauser, R.2
Basin, D.3
-
43
-
-
49849096978
-
SSL/TLS session-aware user authentication revisited
-
OPPLIGER, R., HAUSER, R., and BASIN, D. SSL/TLS session-aware user authentication revisited. Computers & Security 27, 3-4 (2008), 64-70.
-
(2008)
Computers & Security
, vol.27
, Issue.3-4
, pp. 64-70
-
-
Oppliger, R.1
Hauser, R.2
Basin, D.3
-
44
-
-
84870642502
-
-
OWASP. Cross-site Scripting (XSS). https://www.owasp.org/index.php/Cross-site_Scripting_(XSS).
-
Cross-site Scripting (XSS)
-
-
-
45
-
-
85076277090
-
-
OWASP. Man-in-the-browser attack. https://www.owasp.org/index.php/Man-in-the-browser_attack.
-
Man-in-the-browser Attack
-
-
-
47
-
-
85180635364
-
Practical issues with TLS client certificate authentication
-
PARSOVS, A. Practical issues with TLS client certificate authentication. In NDSS, 2014.
-
(2014)
NDSS
-
-
Parsovs, A.1
-
49
-
-
84893275787
-
Certified lies: Detecting and defeating government interception attacks against SSL
-
SOGHOIAN, C., and STAMM, S. Certified lies: Detecting and defeating government interception attacks against SSL. In FC, 2011.
-
(2011)
FC
-
-
Soghoian, C.1
Stamm, S.2
-
51
-
-
84926351578
-
Crying Wolf: An empirical study of SSL warning effectiveness
-
SUNSHINE, J., EGELMAN, S., ALMUHIMEDI, H., ATRI, N., and CRANOR, L. F. Crying wolf: An empirical study of SSL warning effectiveness. In USENIX Security, 2009.
-
(2009)
USENIX Security
-
-
Sunshine, J.1
Egelman, S.2
Almuhimedi, H.3
Atri, N.4
Cranor, L.F.5
-
52
-
-
85034040740
-
Perspectives: Improving SSH-style host authentication with multi-path probing
-
WENDLANDT, D., and ANDERSEN., D. G., and PERRIG, A. Perspectives: Improving SSH-style host authentication with multi-path probing. In USENIX ATC, 2008.
-
(2008)
USENIX ATC
-
-
Wendlandt, D.1
Andersen, D.G.2
Perrig, A.3
|