-
1
-
-
84878615190
-
-
Advanced Network Architecture Group. ANA Spoofer Project. http://spoofer.csail.mit.edu/summary.php, 2012.
-
(2012)
ANA Spoofer Project
-
-
-
2
-
-
84876672330
-
-
Alexa Web Information Company. Top Sites. http://www.alexa.com/topsites, 2012.
-
(2012)
Top Sites
-
-
-
3
-
-
57949111985
-
PuppetNets: Misusing web browsers as a distributed attack infrastructure
-
December
-
Spiros Antonatos, Periklis Akritidis, Vinh The Lam, and Kostas G. Anagnostakis. Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure. ACM Transactions on Information and System Security, 12(2):12:1–12:15, December 2008.
-
(2008)
ACM Transactions on Information and System Security
, vol.12
, Issue.2
, pp. 121-1215
-
-
Antonatos, S.1
Akritidis, P.2
Lam, V.T.3
Anagnostakis, K.G.4
-
5
-
-
70349266257
-
Robust defenses for cross-site request forgery
-
Peng Ning, Paul F. Syverson, and Somesh Jha, editors, ACM
-
Adam Barth, Collin Jackson, and John C. Mitchell. Robust Defenses for Cross-Site Request Forgery. In Peng Ning, Paul F. Syverson, and Somesh Jha, editors, ACM Conference on Computer and Communications Security, pages 75–88. ACM, 2008.
-
(2008)
ACM Conference on Computer and Communications Security
, pp. 75-88
-
-
Barth, A.1
Jackson, C.2
Mitchell, J.C.3
-
6
-
-
0002738343
-
Security problems in the TCP/IP protocol suite
-
apr
-
S. M. Bellovin. Security Problems in the TCP/IP Protocol Suite. Computer Communication Review, 19(2):32–48, apr 1989.
-
(1989)
Computer Communication Review
, vol.19
, Issue.2
, pp. 32-48
-
-
Bellovin, S.M.1
-
7
-
-
0141762463
-
A technique for counting natted hosts
-
ACM
-
Steven M. Bellovin. A Technique for Counting Natted Hosts. In Internet Measurement Workshop, pages 267–272. ACM, 2002.
-
(2002)
Internet Measurement Workshop
, pp. 267-272
-
-
Bellovin, S.M.1
-
8
-
-
21644452807
-
A look back at”security problems in the TCP/IP protocol suite
-
IEEE Computer Society
-
Steven M. Bellovin. A Look Back at”Security Problems in the TCP/IP Protocol Suite”. In ACSAC, pages 229–249. IEEE Computer Society, 2004.
-
(2004)
ACSAC
, pp. 229-249
-
-
Bellovin, S.M.1
-
10
-
-
61849089615
-
TCP SYN flooding attacks and common mitigations
-
August
-
W. Eddy. TCP SYN Flooding Attacks and Common Mitigations. RFC 4987 (Informational), August 2007.
-
(2007)
RFC 4987 (Informational)
-
-
Eddy, W.1
-
16
-
-
35348860223
-
Defeating script injection attacks with browser-enforced embedded policies
-
Carey L. Williamson, Mary Ellen Zurko, Peter F. Patel-Schneider, and Prashant J. Shenoy, editors, ACM
-
Trevor Jim, Nikhil Swamy, and Michael Hicks. Defeating Script Injection Attacks with Browser-Enforced Embedded Policies. In Carey L. Williamson, Mary Ellen Zurko, Peter F. Patel-Schneider, and Prashant J. Shenoy, editors, Proceedings of the 16th International Conference on World Wide Web, pages 601–610. ACM, 2007.
-
(2007)
Proceedings of the 16th International Conference on World Wide Web
, pp. 601-610
-
-
Jim, T.1
Swamy, N.2
Hicks, M.3
-
17
-
-
33746084746
-
Security architecture for the internet protocol
-
December
-
S. Kent and K. Seo. Security Architecture for the Internet Protocol. RFC 4301 (Proposed Standard), December 2005.
-
(2005)
RFC 4301 (Proposed Standard)
-
-
Kent, S.1
Seo, K.2
-
18
-
-
25844457130
-
Recommended internet service provider security services and procedures
-
November
-
T. Killalea. Recommended Internet Service Provider Security Services and Procedures. RFC 3013 (Best Current Practice), November 2000.
-
(2000)
RFC 3013 (Best Current Practice)
-
-
Killalea, T.1
-
20
-
-
84893120390
-
-
klm
-
klm. Remote Blind TCP/IP Spoofing. Phrack magazine, http://www.phrack.org/issues.html?id=15&issue=64, 2007.
-
(2007)
Remote Blind TCP/IP Spoofing
-
-
-
21
-
-
80053026930
-
Timing is everything: The importance of history detection
-
Vijay Atluri and Claudia Díaz, editors, Springer
-
Gunnar Kreitz. Timing Is Everything: The Importance of History Detection. In Vijay Atluri and Claudia Díaz, editors, ESORICS, volume 6879 of Lecture Notes in Computer Science, pages 117–132. Springer, 2011.
-
(2011)
ESORICS, Volume 6879 of Lecture Notes in Computer Science
, pp. 117-132
-
-
Kreitz, G.1
-
22
-
-
77955317816
-
New tricks for defeating SSL in practice
-
February
-
M. Marlinspike. New Tricks for Defeating SSL in Practice. In BlackHat DC, February 2009.
-
(2009)
BlackHat DC
-
-
Marlinspike, M.1
-
27
-
-
77954584716
-
Reining in the web with content security policy
-
Michael Rappa, Paul Jones, Juliana Freire, and Soumen Chakrabarti, editors, ACM
-
Sid Stamm, Brandon Sterne, and Gervase Markham. Reining in the Web with Content Security Policy. In Michael Rappa, Paul Jones, Juliana Freire, and Soumen Chakrabarti, editors, Proceedings of the 19th International Conference on World Wide Web, pages 921–930. ACM, 2010.
-
(2010)
Proceedings of the 19th International Conference on World Wide Web
, pp. 921-930
-
-
Stamm, S.1
Sterne, B.2
Markham, G.3
-
28
-
-
79952547383
-
-
The Open Web Application Security Project. Cross-Site Request Forgery. https://www.owasp.org/index.php/ Cross-Site_Request_Forgery_(CSRF), 2010.
-
(2010)
Cross-Site Request Forgery
-
-
-
31
-
-
80051955689
-
I still know what you visited last summer: Leaking browsing history via user interaction and side channel attacks
-
IEEE Computer Society
-
Zachary Weinberg, Eric Yawei Chen, Pavithra Ramesh Jayaraman, and Collin Jackson. I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks. In IEEE Symposium on Security and Privacy, pages 147–161. IEEE Computer Society, 2011.
-
(2011)
IEEE Symposium on Security and Privacy
, pp. 147-161
-
-
Weinberg, Z.1
Chen, E.Y.2
Jayaraman, P.R.3
Jackson, C.4
-
32
-
-
84864230668
-
-
December
-
Wikipedia. Usage Share of Operating Systems. http://en.wikipedia.org/wiki/Usage_ share_of_operating_systems, December 2011.
-
(2011)
Usage Share of Operating Systems
-
-
-
36
-
-
84866760167
-
-
Starch Press, San Francisco, CA, USA, 1st edition
-
Michal Zalewski. The Tangled Web: A Guide to Securing Modern Web Applications. No Starch Press, San Francisco, CA, USA, 1st edition, 2011.
-
(2011)
The Tangled Web: A Guide to Securing Modern Web Applications
-
-
Zalewski, M.1
|