Afek et al., 2023
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Jackson et al. | Subspace: secure cross-domain communication for web mashups | |
| US10033755B2 (en) | Securing web page content | |
| US20250284812A1 (en) | Browser managed access of corporate resources | |
| De Keukelaere et al. | Smash: secure component model for cross-domain mashups on unmodified browsers | |
| Czeskis et al. | Lightweight server support for browser-based CSRF protection | |
| US12074903B2 (en) | Passive detection of digital skimming attacks | |
| Johns | Code injection vulnerabilities in web applications: Exemplified at cross-site scripting | |
| Pellegrino et al. | Uses and abuses of server-side requests | |
| Liu et al. | Android single sign-on security: Issues, taxonomy and directions | |
| Nakhaei et al. | JSSignature: eliminating third-party-hosted JavaScript infection threats using digital signatures | |
| Praitheeshan et al. | Attainable hacks on Keystore files in Ethereum wallets—A systematic analysis | |
| Satish et al. | Web browser security: different attacks detection and prevention techniques | |
| Imamura et al. | Web access monitoring mechanism via Android WebView for threat analysis | |
| Ofuonye et al. | Securing web-clients with instrumented code and dynamic runtime monitoring | |
| Afek et al. | Localhost detour from public to private networks | |
| Shah et al. | A measurement study of the subresource integrity mechanism on real-world applications | |
| Israeli et al. | Localhost detour from public to private networks: Vulnerabilities and mitigations | |
| Zohrevandi et al. | Auto-FBI: a user-friendly approach for secure access to sensitive content on the web | |
| US12445493B2 (en) | Monitoring cloud computing resources | |
| Wurster | Security mechanisms and policy for mandatory access control in computer systems | |
| Agrawall et al. | Modelling and Mitigation of Cross-Origin Request Attacks on Federated Identity Management Using Cross Origin Request Policy | |
| Norberg | Setup and Configuration | |
| Petty et al. | The Not-So-Same-Origin Policy | |
| Nu1L Team | Virtual Target Penetration Test | |
| De Ryck | Client-side web security: mitigating threats against web sessions |