Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,978,594 papers from all fields of science
Search
Sign In
Create Free Account
Clickjacking
Known as:
Likejacking
, Taphacking
, Cursorjacking
Expand
Clickjacking (User Interface redress attack, UI redress attack, UI redressing) is a malicious technique of tricking a Web user into clicking on…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
37 relations
Adobe Flash
Attack (computing)
Bookmarklet
Browser security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Techniques to Detect Clickjacking Vulnerability in Web Pages
Priya Jyotiyana
,
S. Maheshwari
2018
Corpus ID: 169097017
Clickjacking attack attracts clients towards clicking on items unsuspectingly to set in motion unpleasant web pages that may be…
Expand
2018
2018
Implementation of Web Browser Extension for Mitigating Clickjacking Attack
Amine Benmerzoug
,
Lalia Saoudi
Smart Innovation, Systems and Technologies
2018
Corpus ID: 201130636
Clickjacking is an attack that attracts the web surfer to click on invisible elements on a malicious web page to perform an…
Expand
2018
2018
Security Analysis of CAT-SOOP
S. Boominathan
,
Saroja Erabelli
,
Alap Sahoo
,
Samyukta Yagati
2018
Corpus ID: 46938380
CAT-SOOP is an educational platform used for many introductory computer science classes at MIT. The platform stores a great deal…
Expand
2016
2016
EFFECTIVE APPROACH TO DETECT CLICKJACKING ATTACKS
K. Bala
,
Dr. E. Babu Raj
2016
Corpus ID: 212479517
:- Today’s world revolves around internet technologies. Numerous internet applications and services are available to the users to…
Expand
2016
2016
Mechanized Discovery of Malicious Attack and Providing Security using Frame Breaking in WoT
S. Samuel
,
A. Gopi
2016
Corpus ID: 64182740
This paper highlights the detection unit which detects the malicious components in a web page that redirect users to external…
Expand
Review
2016
Review
2016
A Brief Survey of Detection and Mitigation Techniques for Clickjacking and Drive-by Download Attacks
Tatwadarshi P. Nagarhalli
,
J. Bakal
,
Neha Jain
2016
Corpus ID: 17907277
the advent of the World Wide Web the whole world became closure to each other. Further it has provided a medium to socialise over…
Expand
Review
2014
Review
2014
A Case Study on Clickjacking Attack and Location Leakage
L. Nei
,
Loo Yow Cherng
,
M. Singh
2014
Corpus ID: 110047534
Abs tract— The advanced in technologies such as mobile devices, GSP, WIFI, and 3G has encourage the information sharing using…
Expand
2011
2011
Estudi del tapjacking en Android
Alejandro García Rodríguez
2011
Corpus ID: 114581089
2009
2009
Architectural Risk Analysis of Chromium Mati
M. Khan
,
Mansoor Munib
2009
Corpus ID: 6647106
Conventional risk analysis techniques do not necessarily cover all security aspects in software. Defects in a software design…
Expand
2008
2008
Memento: A Framework for Hardening Web Applications
Karthick Jayaraman
,
Grzegorz Lewandowski
,
S. Chapin
2008
Corpus ID: 8761281
We propose a generic framework called Memento for systemati cally hardening web applications. Memento models a web application’s…
Expand