Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,374,098 papers from all fields of science
Search
Sign In
Create Free Account
Cross-site request forgery
Known as:
Crsf
, Cross Site Request Forgery
, CSRF
Expand
Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF (sometimes pronounced sea-surf) or XSRF, is a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Adobe Flash Player
AngularJS
Authentication
CAPTCHA
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications
Roshan Shaikh
2019
Corpus ID: 208123266
Defending Cross-Site Request Forgery (CSRF) Attacks on Web Applications by Roshan A. Shaikh Submitted in partial fulfillment of…
Expand
2018
2018
Information Security Controls against Cross-Site Request Forgery Attacks on Software Applications of Automated Systems
A. Barabanov
,
A S Markov
,
V. Tsirlov
2018
Corpus ID: 67344057
This paper presents statistical results and their consolidation, which were received in the study into security of various web…
Expand
2014
2014
Cross Site Request Forgery on Android WebView
Bhavani Anantapur Bache
arXiv.org
2014
Corpus ID: 7814210
Android has always been about connectivity and providing great browsing experience. Web-based content can be embedded into the…
Expand
2012
2012
POSSIBLE DETECTION OF AN EMISSION CYCLOTRON RESONANCE SCATTERING FEATURE FROM THE ACCRETION-POWERED PULSAR 4U 1626−67
W. Iwakiri
,
Y. Terada
,
+7 authors
A. Yoshida
2012
Corpus ID: 119278342
We present analysis of 4U 1626−67, a 7.7 s pulsar in a low-mass X-ray binary system, observed with the hard X-ray detector of the…
Expand
2010
2010
Cross-site request forgery attacks against Linksys wireless routers
Ryan Poyar
2010
Corpus ID: 60892346
Poyar, Ryan Lewis. M.S., Purdue University, May 2010. Cross-Site Request Forgery Attacks against Linksys Wireless Routers. Major…
Expand
Review
2010
Review
2010
Review of "Robust defenses for cross-site request forgery" by A. Barth, C. Jackson, J. Mitchell
Zheng Gong
2010
Corpus ID: 107615094
Cross-site attacks are widely used to exploit Web site vulnerability. Barth, Jackson, and Mitchell present in this paper a…
Expand
2010
2010
A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site Request Forgery
Luyi Xing
,
Yuqing Zhang
,
Shenlong Chen
International Symposium on Recent Advances in…
2010
Corpus ID: 8728796
A common-sense CSRF attack involves more than one domain. In this paper, we’ll cover both cross-domain and same-domain CSRF which…
Expand
2010
2010
THEME:Prevention of Cross-Site Request Forgery attacks
Zhou An-hui
2010
Corpus ID: 63372276
Cross-Site Request Forgery (CSRF) is a class of attacks on web applications that exploit implicit authentication processes.These…
Expand
2009
2009
Kajian Keamanan Aplikasi Web Berbasis AJAX Terhadap Serangan Cross Site Request Forgery (CSRF)
A. Pakpahan
2009
Corpus ID: 112557731
Abstrak Penggunaan aplikasi berbasis web merupakan hal yang umum sekarang ini. Pengembang aplikasi yang mengutamakan kecepatan…
Expand
2008
2008
Evolution of cross site request forgery attacks
Renaud Feil
,
L. Nyffenegger
Journal in Computer Virology
2008
Corpus ID: 120211
This paper presents a state of the art of cross-site request forgery (CSRF) attacks and new techniques which can be used by…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE