A survey on web application penetration testing

EA Altulaihan, A Alismail, M Frikha - Electronics, 2023 - mdpi.com
Websites are becoming increasingly effective communication tools. Nevertheless, web
applications are vulnerable to attack and can give attackers access to sensitive information …

Routing protocols in wireless body sensor networks: A comprehensive survey

FT Zuhra, KA Bakar, A Ahmed, MA Tunio - Journal of Network and …, 2017 - Elsevier
Wireless sensor technologies, especially Wireless Body Sensor Network (WBSN) or
Wireless Body Area Sensor Network (WBASN), have gone beyond the fine-grained …

The cookie hunter: Automated black-box auditing for web authentication and authorization flaws

K Drakonakis, S Ioannidis, J Polakis - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
In this paper, we focus on authentication and authorization flaws in web apps that enable
partial or full access to user accounts. Specifically, we develop a novel fully automated black …

An OWASP top ten driven survey on web application protection methods

OB Fredj, O Cheikhrouhou, M Krichen… - Risks and Security of …, 2021 - Springer
Web applications (WAs) are constantly evolving and deployed at broad scale. However, they
are exposed to a variety of attacks. The biggest challenge facing organizations is how to …

P2P networking based internet of things (IoT) sensor node authentication by Blockchain

S Hong - Peer-to-Peer Networking and Applications, 2020 - Springer
Sensor nodes play a major role in IoT environment, and each sensor is a peer to peer
networking. Due to limited physical size, IoT sensor nodes must have light-weight …

[图书][B] SSL and TLS: Theory and Practice

R Oppliger - 2023 - books.google.com
Now in its Third Edition, this completely revised and updated reference provides a thorough
and comprehensive introduction into the SSL, TLS, and DTLS protocols, explaining all the …

One-time cookies: Preventing session hijacking attacks with stateless authentication tokens

I Dacosta, S Chakradeo, M Ahamad… - ACM Transactions on …, 2012 - dl.acm.org
HTTP cookies are the de facto mechanism for session authentication in Web applications.
However, their inherent security weaknesses allow attacks against the integrity of Web …

Shpf: Enhancing http (s) session security with browser fingerprinting

T Unger, M Mulazzani, D Frühwirt… - 2013 International …, 2013 - ieeexplore.ieee.org
Session hijacking has become a major problem in today's Web services, especially with the
availability of free off-the-shelf tools. As major websites like Facebook, You tube and Yahoo …

CVSS: A cost-efficient and QoS-aware video streaming using cloud services

X Li, MA Salehi, M Bayoumi… - 2016 16th IEEE/ACM …, 2016 - ieeexplore.ieee.org
Video streams, either in form of on-demand streaming or live streaming, usually have to be
converted (ie, transcoded) based on the characteristics of clients' devices (eg, spatial …

Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures

ST Sun, K Hawkey, K Beznosov - Computers & Security, 2012 - Elsevier
OpenID 2.0 is a user-centric Web single sign-on protocol with over one billion OpenID-
enabled user accounts, and tens of thousands of supporting websites. While the security of …