Essays about: "Cross-site scripting"
Showing result 6 - 10 of 15 essays containing the words Cross-site scripting.
-
6. Proof-of-Possession Tokens in Microservice Architectures
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : The popular OAuth 2.0 Framework specifies the use of Bearer Tokens for the transmission of authorization credentials. A Bearer Token has the property that any party in possession of it can use the it. Requests including Bearer Tokens are therefore performed over a secure channel t oensure that tokens cannot be obtained by eavesdroppers. READ MORE
-
7. WebTaint: Dynamic Taint Tracking for Java-based Web Applications
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The internet is a source of information and it connects the world through a single platform. Many businesses have taken advantage of this to share information, to communicate with customers, and to create new business opportunities. However, this does not come without drawbacks as there exists an elevated risk to become targeted in attacks. READ MORE
-
8. Near Real-time Detection of Masquerade attacks in Web applications : catching imposters using their browsing behavor
University essay from KTH/KommunikationsnätAbstract : This Thesis details the research on Machine Learning techniques that are central in performing Anomaly and Masquerade attack detection. The main focus is put on Web Applications because of their immense popularity and ubiquity. This popularity has led to an increase in attacks, making them the most targeted entry point to violate a system. READ MORE
-
9. Domain-Driven Security : Injection & Cross-site scripting
University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)Abstract : Many web applications are vulnerable to Injection and Cross-site scripting. These attacks are often focused on infrastructural parts of the application. This thesis investigates if Domain-Driven Design can unify existing technical protection mechanisms as well as provide protection for attacks aimed at the business logic of an application. READ MORE
-
10. Generating web applications containing XSS and CSRF vulnerabilities
University essay from Linköpings universitet/Databas och informationsteknik; Linköpings universitet/Tekniska högskolanAbstract : Most of the people in the industrial world are using several web applications every day. Many of those web applications contain vulnerabilities that can allow attackers to steal sensitive data from the web application's users. One way to detect these vulnerabilities is to have a penetration tester examine the web application. READ MORE