Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,237,304 papers from all fields of science
Search
Sign In
Create Free Account
Session hijacking
Known as:
WhatsApp sniffer
, Cookie hijacking
, Session-stealing
Expand
In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
30 relations
ARP spoofing
Application security
ArpON - ARP handler inspection
CRIME
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
µRAI: Securing Embedded Systems with Return Address Integrity
Network and Distributed System Security Symposium
2020
Corpus ID: 211095803
Embedded systems are deployed in security critical environments and have become a prominent target for remote attacks…
Expand
2018
2018
Session Hijacking and Prevention Technique
Anuj Kumar Baitha
,
S. Vinod
2018
Corpus ID: 56356722
Session Hijacking is an attack which is basically used to gain the unauthorized access between an authorized session connections…
Expand
2016
2016
Colluding browser extension attack on user privacy and its implication for web browsers
Anil Saini
,
M. Gaur
,
V. Laxmi
,
M. Conti
Computers & security
2016
Corpus ID: 28626168
2015
2015
Cancer and cancer stem cell targeting agents : A focus on salinomycin and apoptin
Jaganmohan Reddy Jangamreddy
Linköping University Medical Dissertations
2015
Corpus ID: 6745729
Current cancer treatments involving surgery, radiotherapy, and chemotherapy target the vast majority of cancer cells, but they…
Expand
Highly Cited
2011
Highly Cited
2011
SessionShield: Lightweight Protection against Session Hijacking
Nick Nikiforakis
,
Wannes Meert
,
Yves Younan
,
Martin Johns
,
W. Joosen
Engineering Secure Software and Systems
2011
Corpus ID: 14993872
The class of Cross-site Scripting (XSS) vulnerabilities is the most prevalent security problem in the field of Web applications…
Expand
2011
2011
Detection of session hijacking
J. Louis
2011
Corpus ID: 62123275
A Thesis submitted at the University of Bedfordshire In partial fulfilment for the degree of Masters of Science In Computer…
Expand
Highly Cited
2008
Highly Cited
2008
iSPY: Detecting IP Prefix Hijacking on My Own
Zheng Zhang
,
Ying Zhang
,
Y. C. Hu
,
Z. Morley Mao
,
R. Bush
IEEE/ACM Transactions on Networking
2008
Corpus ID: 11490114
IP prefix hijacking remains a major threat to the security of the Internet routing system due to a lack of authoritative prefix…
Expand
Highly Cited
2007
Highly Cited
2007
Accurate Real-time Identication of IP Prex Hijacking
Xin Hu
,
Z. Morley Mao
2007
Corpus ID: 110250806
We present novel and practical techniques to accurately detect IP prex hijacking attacks in real time to facilitate mitigation…
Expand
Highly Cited
2005
Highly Cited
2005
A testing framework for Web application security assessment
Yao-Wen Huang
,
Chung-Hung Tsai
,
Tsung-Po Lin
,
Shih-Kun Huang
,
Der-Tsai Lee
,
S. Kuo
Comput. Networks
2005
Corpus ID: 206899075
Highly Cited
1999
Highly Cited
1999
TCP/IP security threats and attack methods
B. Harris
,
R. Hunt
Computer Communications
1999
Corpus ID: 7850419
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE