Movatterモバイル変換


[0]ホーム

URL:


Afek et al., 2023 - Google Patents

Localhost detour from public to private networks

Afek et al., 2023

ViewPDF
Document ID
7788927283916891491
Author
Afek Y
Bremler-Barr A
Israeli D
Noy A
Publication year
Publication venue
International Symposium on Cyber Security, Cryptology, and Machine Learning

External Links

Snippet

This paper presents a new localhost browser based vulnerability and corresponding attack that opens the door to new attacks on private networks and local devices. We show that this new vulnerability may put hundreds of millions of internet users and their IoT devices at risk …
Continue reading atdeepness-lab.org (PDF) (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Similar Documents

PublicationPublication DateTitle
Jackson et al.Subspace: secure cross-domain communication for web mashups
US10033755B2 (en)Securing web page content
US20250284812A1 (en)Browser managed access of corporate resources
De Keukelaere et al.Smash: secure component model for cross-domain mashups on unmodified browsers
Czeskis et al.Lightweight server support for browser-based CSRF protection
US12074903B2 (en)Passive detection of digital skimming attacks
JohnsCode injection vulnerabilities in web applications: Exemplified at cross-site scripting
Pellegrino et al.Uses and abuses of server-side requests
Liu et al.Android single sign-on security: Issues, taxonomy and directions
Nakhaei et al.JSSignature: eliminating third-party-hosted JavaScript infection threats using digital signatures
Praitheeshan et al.Attainable hacks on Keystore files in Ethereum wallets—A systematic analysis
Satish et al.Web browser security: different attacks detection and prevention techniques
Imamura et al.Web access monitoring mechanism via Android WebView for threat analysis
Ofuonye et al.Securing web-clients with instrumented code and dynamic runtime monitoring
Afek et al.Localhost detour from public to private networks
Shah et al.A measurement study of the subresource integrity mechanism on real-world applications
Israeli et al.Localhost detour from public to private networks: Vulnerabilities and mitigations
Zohrevandi et al.Auto-FBI: a user-friendly approach for secure access to sensitive content on the web
US12445493B2 (en)Monitoring cloud computing resources
WursterSecurity mechanisms and policy for mandatory access control in computer systems
Agrawall et al.Modelling and Mitigation of Cross-Origin Request Attacks on Federated Identity Management Using Cross Origin Request Policy
NorbergSetup and Configuration
Petty et al.The Not-So-Same-Origin Policy
Nu1L TeamVirtual Target Penetration Test
De RyckClient-side web security: mitigating threats against web sessions

[8]
ページ先頭

©2009-2025 Movatter.jp