Content Security Policy

Known as: CSP, Content security 
Content Security Policy (CSP) is a computer security standard introduced to prevent cross-site scripting (XSS), clickjacking and other code injection… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Content Security Policy (CSP) is a recent W3C standard introduced to prevent and mitigate the impact of content injection… (More)
  • table 1
  • table 4
  • table 6
  • table 7
  • figure 1
Is this relevant?
2017
2017
Content Security Policy (CSP) is a W3C standard designed to prevent and mitigate the impact of content injection vulnerabilities… (More)
Is this relevant?
2017
2017
Modern browsers implement different security policies such as the Content Security Policy (CSP), a mechanism designed to mitigate… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
2016
2016
Content Security Policy (CSP) is an emerging W3C standard introduced to mitigate the impact of content injection vulnerabilities… (More)
  • table 1
  • table 2
  • table 3
  • figure 1
  • figure 2
Is this relevant?
2016
2016
A content security policy (CSP) can help Web application developers and server administrators better control website content and… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 5
Is this relevant?
2016
2016
Content Security Policy (CSP) is a browser security mechanism that aims to protect websites from content injection attacks. To… (More)
  • table 1
  • figure 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
2015
2015
Cross-site scripting (XSS) vulnerabilities are among the most prevailing problems on the web. Among the practically deployed… (More)
Is this relevant?
2014
2014
Content Security Policies (CSPs) provide powerful means to mitigate most XSS exploits. However, CSP’s protection is incomplete… (More)
  • table 1
  • figure 1
Is this relevant?
2013
2013
Content Security Policy (CSP) is a browser security mechanism that aims to protect websites from content injection attacks. To… (More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008… (More)
Is this relevant?