Essays about: "Cross-site request forgery"

Showing result 1 - 5 of 6 essays containing the words Cross-site request forgery.

  1. 1. SQL injection attacks and countermeasures in PHP, and Cross-Site Request Forgery

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Alexander Sabelström; [2023]
    Keywords : ;

    Abstract : Websites have become a vital tool for any establishment's success. However, all users do not enter websites with good intentions. Two commonly seen website functionalities are a login system and the possibility for users to leave and read reviews. READ MORE

  2. 2. Evaluating the Single Sign-On Protocol OpenID Connect for an Electronic Document Signature Service From a Security Perspective

    University essay from Linköpings universitet/Programvara och system

    Author : Ludvig Thor; [2022]
    Keywords : OIDC; Single sign-on; Security;

    Abstract : Today, there is an increasing demand for authentication services to provide authentication to users on the internet. One example of an authentication protocol is OpenID Connect. It is used by for example Google to provide single sign-on functionality to millions of users. READ MORE

  3. 3. How Secure is Verisure’s Alarm System?

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lars-Eric Hamid; Simon Möller; [2020]
    Keywords : Alarm system; Cross-site request forgery; Cyber-security; Denial of Service; Hacking; Internet of Things; Verisure;

    Abstract : Security is a very important part of today’s society.Verisure is the leader in home alarm systems with 30 years ofexperience. In this project, we aim to evaluate how secure theiralarm system is from a software perspective. The system wasbought in January 2020. READ MORE

  4. 4. A Security Analysis of Wireless Smart Home Technologies

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Niclas Hansson; Alexander Lantz; Ludvig Fischerström; [2015]
    Keywords : Smart home technologies; Internet security; Internet of Things; Tellstick Net;

    Abstract : The use of electronics connected to local networks and the Internet is growingall the time. Nowadays you can control your electronics in your house even when away from home, which opens up for potential security threats. READ MORE

  5. 5. Generating web applications containing XSS and CSRF vulnerabilities

    University essay from Linköpings universitet/Databas och informationsteknik; Linköpings universitet/Tekniska högskolan

    Author : Gustav Ahlberg; [2014]
    Keywords : Web security; CSRF; XSS; Cross Site Request Forgery; Cross Site Scripting; Taint analysis; vulnerability; generating web applications;

    Abstract : Most of the people in the industrial world are using several web applications every day. Many of those web applications contain vulnerabilities that can allow attackers to steal sensitive data from the web application's users. One way to detect these vulnerabilities is to have a penetration tester examine the web application. READ MORE