Author:
Calzavara Stefano,Urban Tobias,Tatang Dennis,Steffens Marius,Stock Ben
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Systematic literature review on security misconfigurations in web applications;International Journal of Computers and Applications;2024-08-19
2. You Call This Archaeology? Evaluating Web Archives for Reproducible Web Security Measurements;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
3. Honey, I Cached our Security Tokens Re-usage of Security Tokens in the Wild;Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses;2023-10-16
4. Coverage and Secure Use Analysis of Content Security Policies via Clustering;2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P);2023-07
5. The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web;2023 IEEE Symposium on Security and Privacy (SP);2023-05