2017 IEEE European Symposium on Security and Privacy (EuroS&P) 2017
DOI: 10.1109/eurosp.2017.45
|View full text |Cite
|
Sign up to set email alerts
|

Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(14 citation statements)
references
References 11 publications
0
14
0
Order By: Relevance
“…This can be used for instance to steal confidential information that will be sent to Eve's account instead of Alice's account. We will not consider protection against login CSRF in this paper; we refer the interested reader to [34] for some recent results on the topic.…”
Section: ) Current Fixes and Mitigationsmentioning
confidence: 99%
See 3 more Smart Citations
“…This can be used for instance to steal confidential information that will be sent to Eve's account instead of Alice's account. We will not consider protection against login CSRF in this paper; we refer the interested reader to [34] for some recent results on the topic.…”
Section: ) Current Fixes and Mitigationsmentioning
confidence: 99%
“…For example, if a website defends against CSRF through the use of an unpredictable user identifier, then Alice's requests will be rejected in Bob's session. The use of two test accounts for CSRF detection has already been advocated in previous work [34] and is part of traditional manual testing strategies. 10 After installing Mitch in her browser, the security tester first navigates the website as Alice: for every HTTP request detected as sensitive, Mitch stores the content of the corresponding HTTP response.…”
Section: A Key Idea and Challengesmentioning
confidence: 99%
See 2 more Smart Citations
“…Since its discovery in 2001 [36], CSRF vulnerabilities have been continuosly ranked as one of the top three security risks for web applications, along with cross-site scripting (XSS) and SQL injection (SQLi) [6,11,31]. Successful CSRF exploitations can result in illicit money transfers [43], user account takeover [38], or remote server-side command execution [19], to name only a few publicly documented cases. In the past, similar vulnerabilities have been discovered in many popular websites including Gmail [34], Netix [12], ING Direct [43], and, more recently, in Google, Skype, and Ali Express websites [38].…”
Section: Introductionmentioning
confidence: 99%