Active Bibliography

IN EEN WEB 2.0 CONTEXT – Wim Maes, K. U. Leuven, Korte Inhoud
3 Browser protection against Cross-Site Request Forgery InWorkshop on Secure Execution of Untrusted Code (SecuCode – Wim Maes, Thomas Heyman, Lieven Desmet, Wouter Joosen - 2009
7 CsFire: Transparent client-side mitigation of malicious cross-domain requests – Lieven Desmet, Thomas Heyman, Frank Piessens, Wouter Joosen
4 Automatic and precise client-side protection against csrf attacks - downloads. https:// distrinet.cs.kuleuven.be/software/CsFire/esorics2011 – Lieven Desmet, Wouter Joosen, Frank Piessens - 2011
10 Spectator: Detection and Containment of JavaScript Worms – Benjamin Livshits, Weidong Cui
30 Dynamic Pharming Attacks and Locked Same-origin Policies for Web Browsers – Chris Karlof, J. D. Tygar, David Wagner, Umesh Shankar - 2007
86 Robust Defenses for Cross-Site Request Forgery – Adam Barth, et al. - 2008
5 SessionShield: Lightweight Protection against Session Hijacking – Nick Nikiforakis, Wannes Meert, Yves Younan, Martin Johns - 2011
Lightweight Server Support for Browser-Based CSRF Protection ABSTRACT – Alexei Czeskis, Tadayoshi Kohno
18 Characterizing Insecure JavaScript Practices on the Web – Chuan Yue, Haining Wang
Understanding and Defending against . . . – Alexander Nikolaevich Moshchuk - 2009
2.1 Parameter Precedence in Web Applications............................. 3 2.2 Parameter Pollution.......................................... 4 – Marco ‘embyte Balduzzi
Strengthening XSRF DefensesforLegacyWeb Applications UsingWhitebox Analysis and Transformation – Michelle Zhou, Prithvi Bisht, V. N. Venkatakrishnan
Position Paper: Why Are There So Many Vulnerabilities in Web Applications? ∗ – Wenliang Du, Karthick Jayaraman, Xi Tan, Tongbo Luo, Steve Chapin
1 Reducing Attack Surfaces for Intra-Application Communication in Android – David Kantola, Erika Chin, Warren He, David Wagner
Helping Developers Construct Secure Mobile Applications – Erika Chin, Erika Michelle Chin, Erika Michelle Chin
8 ESCUDO: A Fine-grained Protection Model for Web Browsers – Karthick Jayaraman, Wenliang Du, Balamurugan Rajagopalan, Steve J. Chapin
8 Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications – Marco Balduzzi, Carmen Torrano Gimenez, Davide Balzarotti, Engin Kirda
42 Analyzing Inter-Application Communication in Android – Erika Chin, Adrienne Porter, Felt Kate, Greenwood David Wagner