|
[1] D. Kristol and L. Montulli, “HTTP State Management Mechanism,” Internet Engineering Task Force (IETF) RFC 2109, 1997. [2] J. Kolšek. “Session fixation vulnerability in web-based applications,” http://www.acros.si/papers/session_fixation.pdf, 2002. [3] A. Barth, C. Jackson, and J.C. Mitchell, “Robust defenses for cross-site request forgery,” Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS), pp. 75-88, 2008. [4] Microsoft Developer Network, "Mitigating cross-site scripting with http-only cookies," http://msdn.microsoft.com/workshop/author/dhtml/httponly_cookies.asp [5] J. S. Park and R. Sandhu, “Secure Cookies on the Web,” IEEE Internet Computing, 4:36–44, 2000. [6] A. X. Liu, J. M. Kovacs, C. T. Huang, and M. G.Gouda, “A secure cookie protocol," Proceedings of 14th IEEE International Conference on Computer Communications and Networks (ICCCN), pp. 333-338, 2005. [7] I. Ayadi, A. Serrouchni, G. Pujolle, “Integrity Cookie Management,” Internet Engineering Task Force (IETF) RFC draft, 2010. [8] T. Choi and M. G. Gouda, “HTTPI: An HTTP with Integrity,” Proceedings of 20th International Conference on Computer Communications And Networks (ICCCN), 2011. [9] G. Pujolle, A. Serhrouchni, and I. Ayadi, “Secure session management with cookies,” in Information, Communications and Signal Processing (ICICS), 2009. [10] I. Ayadi, A. Serhrouchni, G. Pujolle and N. Simoni, “HTTP Session Management: Architecture and Cookies Security,” Proceeding of Conference on Network And Information Systems Security (SAR-SSI), 2011. [11] M. Johns, B. Braun, M. Schrank, and J. Posegga, “Reliable Protection Against Session Fixation Attacks,” ACM Symposium on Applied Computing, 2011. [12] Y. Pettersen, “Identifying origin server of HTTP Cookies,” Internet Engineering Task Force (IETF) RFC draft, 2011. [13] A. Bortz, A. Barth and A. Czeskis, “Origin Cookies: Session Integrity for Web Applications,” Proceedings of the Web 2.0 Security and Privacy (W2SP), 2011. [14] R. Lundeen, J. Ou, T. Rhodes, “New Ways I’m Going to Hack Your Web App,” 2011. https://media.blackhat.com/bh-ad-11/Lundeen/bh-ad-11-Lundeen-New_Ways_Hack_WebApp-WP.pdf [15] World Wide Web Consortium, “DOM,” http://www.w3.org/DOM/ [16] L. Huang, Z. Weinberg, C. Evans, and C. Jackson, "Protecting browsers from Cross-Origin CSS attacks," Proceedings of the 17th ACM conference on Computer and Communications Security (CCS), 2010. [17] H. Bojinov, E. Bursztein, and D. Boneh, "XCS: cross channel scripting and its impact on web applications," Proceedings of the 16th ACM conference on Computer and communications security (CCS), 2009. [18] A. Barth, “HTTP State Management Mechanism,” Internet Engineering Task Force (IETF) RFC 6265, 2011. [19] SQLite, “SQLite,” http://www.sqlite.org/ [20] Mozilla Developer Network, “Observer Notifications,” https://developer.mozilla.org/en/Observer_Notifications [21] M. Van Gundy and H. Chen, “Noncespaces: Using randomization to enforce information flow tracking and thwart cross-site scripting attacks,” Proceedings of the 16th Annual Network & Distributed System Security Symposium (NDSS), 2009. [22] V.N. Mike Ter Louw, “Blueprint: Robust prevention of cross-site scripting attacks for existing browsers,” Proceeding of the IEEE Symposium on Security and Privacy, pp. 331–346, 2009. [23] Z. Weinberg, E. Chen, P. R. Jayaraman, and C. Jackson, “I still know what you visited last summer: Leaking browsing history via user interaction and side channel attacks,” Proceedings of the IEEE Symposium on Security and Privacy, 2011. [24] Y. Takamatsu, Y. Kosuga, K. Kono, “Automated Detection of Session Fixation Vulnerabilites,” Proceedings of the 19th International World Wide Web Conference (WWW), 2010. [25] D. Ferraiolo and D. R. Kuhn, “Role-Based Access Controls,” Proceedings of the 15th National Computer Security Conference (NCSC), page 554-563, 1992. [26] Alexa, “Alexa Top 500 Sites”, http://www.alexa.com/topsites [27] C. Visaggio, “Session Management Vulnerabilities in Today’s Web,” Proceeding of the IEEE Symposium on Security and Privacy, 8:48–56, 2010. [28] Mozilla Foundation, “Public Suffix List,” http://publicsuffix.org/ [29] B. Rios, “Twitter XSS Bug,” http://xs-sniper.com/blog/2010/07/19/twitter-xss-bug/ [30] Y. Zhou and D. Evans, "Why Aren’t HTTP-only Cookies More Widely Deployed?" Proceedings of the Web 2.0 Security and Privacy (W2SP), 2010.
|