首页> 外文会议>Recent advances in intrusion detection >A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery
【24h】

A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery

机译:基于客户端和服务器的跨站请求伪造防御机制

获取原文
获取原文并翻译 | 示例

摘要

A common-sense CSRF attack involves more than one domain. In this paper, we'll cover both cross-domain and same-domain CSRF which overlaps with Cross-Site Scripting (XSS). If a XSS instructs victims to send requests to the same domain, it is also a CSRF-same-domain CSRF. Such sort of XSS-CSRF exists extensively and even high profile sites cannot always avoid such vulnerabilities.
机译:常识性CSRF攻击涉及多个域。在本文中,我们将介绍与跨站点脚本(XSS)重叠的跨域CSRF和同域CSRF。如果XSS指示受害者将请求发送到同一域,则它也是CSRF相同域的CSRF。这类XSS-CSRF广泛存在,甚至高知名度的站点也无法始终避免此类漏洞。

著录项

  • 来源
  • 会议地点 Ottawa(CA);Ottawa(CA)
  • 作者单位

    National Computer Network Intrusion Protection Center, GUCAS, Beijing 100049, China State Key Laboratory of Information Security, GUCAS, Beijing 100049, China;

    National Computer Network Intrusion Protection Center, GUCAS, Beijing 100049, China State Key Laboratory of Information Security, GUCAS, Beijing 100049, China;

    National Computer Network Intrusion Protection Center, GUCAS, Beijing 100049, China State Key Laboratory of Information Security, GUCAS, Beijing 100049, China;

  • 会议组织
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 安全保密;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号