1 |
Nenad Jovanovic, Engin Kirda, and Christopher Kruegel, "Preventing Cross Site Request Forgery Attacks," IEEE Proc. of Securecomm and Workshops 2006, pp.1-10, August 2006.
|
2 |
Soeui Kim, Duri Choi, Beongku An, "Detection and Prevention Method by Analyzing Malignant Code of Malignant Bot," JIIBC, pp.199-207, vol.13, no.2, April 2013.
과학기술학회마을
DOI
|
3 |
Boyan Chen, Pavol Zavarsky, Ron Ruhl and Dale Lindskog, "A Study of the Effectiveness of CSRF Guard," IEEE Proc. of PASSAT/SocialCom 2011, October 2011.
|
4 |
http://www.vmware-com/support/ws3/doc/whatsnew_ws.html
|
5 |
http://www.virusbtn.com/magazine/overview/index,xml
|
6 |
ftp://ftp.cs.uta.fi/pub/vru/documents/test1997.zip
|
7 |
Xiaoli Lin, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, "Threat Modeling for CSRF Attacks," IEEE Proc. of CSE2009, pp.486-491, August 2009.
|
8 |
Hossein Saiedian, Dan S. Broyles, "Security Vulnerabilities in the Same-Origin Policy: Implications and Alternatives," Computer, vol.44, issue9, pp.29 -36, September 2011.
|
9 |
Tatiana Alexenko, Mark Jenne, Suman Deb Roy, Wenjun Zeng, "Cross-Site Request Forgery: Attack and Defense," IEEE Proc. of CCNC2010, pp.1-2, January 2010.
|
10 |
Yin-Chang Sung, Michael Cheng Yi Cho, Chi-Wei Wang, Chia-Wei Hsu, Shiuhpyng Winston Shieh, "Light-Weight CSRF Protection by Labeling User-Created Contents," IEEE Proc. of SERE 2013, pp.60-69, June 2013.
|