Short Paper: Superhacks: Exploring and Preventing Vulnerabilities in Browser Binding Code
Abstract
References
Index Terms
- Short Paper: Superhacks: Exploring and Preventing Vulnerabilities in Browser Binding Code
Recommendations
Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection
Financial Cryptography and Data SecurityA cross site request forgery (CSRF) attack occurs when a user's web browser is instructed by a malicious webpage to send a request to a vulnerable web site, resulting in the vulnerable web site performing actions not intended by the user. CSRF ...
The darker side of Firefox extension
SIN '13: Proceedings of the 6th International Conference on Security of Information and NetworksA Web browser is an important component of every computer system as it provides the interface to the Internet world. The new unforeseen functionalists may be added to the web browsers in the form of extensions. These extensions enhance the core ...
When tolerance causes weakness: the case of injection-friendly browsers
WWW '13: Proceedings of the 22nd international conference on World Wide WebWe present a practical off-path TCP-injection attack for connections between current, non-buggy browsers and web-servers. The attack allows web-cache poisoning with malicious objects; these objects can be cached for long time period, exposing any user ...
Comments
Information & Contributors
Information
Published In

Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Short-paper
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 432Total Downloads
- Downloads (Last 12 months)104
- Downloads (Last 6 weeks)16
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in