2016
DOI: 10.1007/s13198-016-0489-0
|View full text |Cite
|
Sign up to set email alerts
|

SECSIX: security engine for CSRF, SQL injection and XSS attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
3

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 11 publications
(18 citation statements)
references
References 13 publications
0
15
0
3
Order By: Relevance
“…Table 13 shows the comparison-based analysis of our work with the existing state-of-art corresponding to the eleven research gaps. Hence, the performance overhead caused due to context-aware sanitization in our recent work [5][6][7][8] (as well as in other recent works [22][23][24][25][26] ) is improved through the integration of the method to implement the inner context-aware sanitization only on such compressed templates. Our fog-centric framework also performed the clustering on the redundant JavaScript snippets implanted in the parse tree and subsequently produces a compressed attack vector template.…”
Section: R11: Parse Tree Deviationmentioning
confidence: 96%
See 2 more Smart Citations
“…Table 13 shows the comparison-based analysis of our work with the existing state-of-art corresponding to the eleven research gaps. Hence, the performance overhead caused due to context-aware sanitization in our recent work [5][6][7][8] (as well as in other recent works [22][23][24][25][26] ) is improved through the integration of the method to implement the inner context-aware sanitization only on such compressed templates. Our fog-centric framework also performed the clustering on the redundant JavaScript snippets implanted in the parse tree and subsequently produces a compressed attack vector template.…”
Section: R11: Parse Tree Deviationmentioning
confidence: 96%
“…[22][23][24] However, none of them were analyzed on real virtual infrastructures of web platforms. [22][23][24] However, none of them were analyzed on real virtual infrastructures of web platforms.…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…Significant number of solutions have already been proposed in the past for securing the client's authenticated session to the server which addresses the threat of CSRF , as well as for session hijacking . Almost all of the previous works propose an additional communication layer or proxy‐layer between the client and the server.…”
Section: Related Workmentioning
confidence: 99%
“…Reflected cross-site scripting is the type where the malicious script is delivered to the victim through an alternate channel like through scripts embedded in an e-mail message. The victim is tricked into clicking an infected link or opening an infected FIGURE 8 Internal layered storage design of CookieArmor e-mail attachment which in turn executes the malicious script. Reflected cross-site-scripting threats are also known as Type-II or nonpersistent cross-site scripting as shown in Figure 7B.…”
Section: Cross-site Scriptingmentioning
confidence: 99%