Same-origin policy

Results: 47



#Item
21A Two-Tier Sandbox Architecture for Untrusted JavaScript ∗ Phu H. Phung  Lieven Desmet

A Two-Tier Sandbox Architecture for Untrusted JavaScript ∗ Phu H. Phung Lieven Desmet

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2012-05-30 05:23:58
22SOMA: Mutual Approval for Included Content On Web Pages Terri Oda, Glenn Wurster, P. C. van Oorschot, Anil Somayaji

SOMA: Mutual Approval for Included Content On Web Pages Terri Oda, Glenn Wurster, P. C. van Oorschot, Anil Somayaji

Add to Reading List

Source URL: terri.zone12.com

Language: English - Date: 2008-11-05 16:24:05
23SOMA: Mutual Approval for Included Content in Web Pages Terri Oda Glenn Wurster P. C. van Oorschot Anil Somayaji Carleton Computer Security Lab School of Computer Science Carleton University, Canada

SOMA: Mutual Approval for Included Content in Web Pages Terri Oda Glenn Wurster P. C. van Oorschot Anil Somayaji Carleton Computer Security Lab School of Computer Science Carleton University, Canada

Add to Reading List

Source URL: terri.zone12.com

Language: English - Date: 2008-11-02 21:28:43
24Cross-site scripting / FTP clients / News aggregators / Computer network security / HTTP cookie / Internet Explorer / Vulnerability / Same origin policy / Cross-site request forgery / Computer security / Cyberwarfare / Computing

Internet Explorer 11 vulnerability allows policy bypass

Add to Reading List

Source URL: techxplore.com

Language: English - Date: 2015-05-28 21:28:13
25Server-driven Outbound Web-application Sandboxing  FP7-ICT, Project Nohttps://www.websand.eu  Deliverable D4.1

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D4.1

Add to Reading List

Source URL: www.websand.eu

Language: English - Date: 2011-10-25 10:27:30
26HTTPi for Practical End-to-End Web Content Integrity Kapil Singh Helen J. Wang  Alexander Moshchuk

HTTPi for Practical End-to-End Web Content Integrity Kapil Singh Helen J. Wang Alexander Moshchuk

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2011-08-29 20:00:09
27Architectures for Inlining Security Monitors in Web Applications Jonas Magazinius, Daniel Hedin, and Andrei Sabelfeld Chalmers University of Technology, Gothenburg, Sweden  Abstract. Securing JavaScript in the browser is

Architectures for Inlining Security Monitors in Web Applications Jonas Magazinius, Daniel Hedin, and Andrei Sabelfeld Chalmers University of Technology, Gothenburg, Sweden Abstract. Securing JavaScript in the browser is

Add to Reading List

Source URL: www.cse.chalmers.se

Language: English - Date: 2013-12-06 11:26:36
281  The State of the Cross-domain Nation Sebastian Lekies, Martin Johns and Walter Tighzert SAP Research Karlsruhe {firstname.lastname}@sap.com

1 The State of the Cross-domain Nation Sebastian Lekies, Martin Johns and Walter Tighzert SAP Research Karlsruhe {firstname.lastname}@sap.com

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:02
29When Elephants Dance, Mice Must Be Careful: Content Provider Conflict on the Modern Web Terri Oda, Anil Somayaji, Tony White

When Elephants Dance, Mice Must Be Careful: Content Provider Conflict on the Modern Web Terri Oda, Anil Somayaji, Tony White

Add to Reading List

Source URL: terri.zone12.com

Language: English - Date: 2008-11-27 19:16:50
30

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:27