Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,120,281 papers from all fields of science
Search
Sign In
Create Free Account
Cross-site request forgery
Known as:
Crsf
, Cross Site Request Forgery
, CSRF
Expand
Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF (sometimes pronounced sea-surf) or XSRF, is a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Adobe Flash Player
AngularJS
Authentication
CAPTCHA
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications
Roshan Shaikh
2019
Corpus ID: 208123266
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications by Roshan A. Shaikh Submitted in partial fulfillment of…
Expand
2017
2017
The Study into Cross-Site Request Forgery Attacks within the Framework of Analysis of Software Vulnerabilities
Труды Исп Ран
2017
Corpus ID: 55978282
Nowadays, web applications are one of the most popular types of target of evaluation within the framework of the information…
Expand
Review
2015
Review
2015
DETECTION AND PREVENTION OF CLICKJACKING AND CROSS SITE REQUEST FORGERY
Vrindamol
2015
Corpus ID: 212501815
Web applications are currently a part of day to day life due to their user friendly environment and advancement of technology to…
Expand
2014
2014
Cross Site Request Forgery on Android WebView
Bhavani Anantapur Bache
arXiv.org
2014
Corpus ID: 7814210
Android has always been about connectivity and providing great browsing experience. Web-based content can be embedded into the…
Expand
2012
2012
POSSIBLE DETECTION OF AN EMISSION CYCLOTRON RESONANCE SCATTERING FEATURE FROM THE ACCRETION-POWERED PULSAR 4U 1626−67
W. Iwakiri
,
Y. Terada
,
+7 authors
A. Yoshida
2012
Corpus ID: 119278342
We present analysis of 4U 1626−67, a 7.7 s pulsar in a low-mass X-ray binary system, observed with the hard X-ray detector of the…
Expand
2010
2010
Cross-site request forgery attacks against Linksys wireless routers
Ryan Poyar
2010
Corpus ID: 60892346
Poyar, Ryan Lewis. M.S., Purdue University, May 2010. Cross-Site Request Forgery Attacks against Linksys Wireless Routers. Major…
Expand
Review
2010
Review
2010
Review of "Robust defenses for cross-site request forgery" by A. Barth, C. Jackson, J. Mitchell
Zheng Gong
2010
Corpus ID: 107615094
Cross-site attacks are widely used to exploit Web site vulnerability. Barth, Jackson, and Mitchell present in this paper a…
Expand
2009
2009
Kajian Keamanan Aplikasi Web Berbasis AJAX Terhadap Serangan Cross Site Request Forgery (CSRF)
A. Pakpahan
2009
Corpus ID: 112557731
Abstrak Penggunaan aplikasi berbasis web merupakan hal yang umum sekarang ini. Pengembang aplikasi yang mengutamakan kecepatan…
Expand
2008
2008
Evolution of cross site request forgery attacks
Renaud Feil
,
L. Nyffenegger
Journal in Computer Virology
2008
Corpus ID: 120211
This paper presents a state of the art of cross-site request forgery (CSRF) attacks and new techniques which can be used by…
Expand
2006
2006
Putting the tools to work: how to succeed with source code analysis
Pravir Chandra
,
B. Chess
,
J. Steven
IEEE Security and Privacy
2006
Corpus ID: 16339311
Code analysis tools can play an essential role in creating secure software. They can help catch common coding mistakes such as…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE