共 50 条
- [1] Request and Conquer: Exposing Cross-Origin Resource Size PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 447 - 462
- [3] Protecting Browsers from Cross-Origin CSS Attacks PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 619 - 629
- [4] An Automatic Data Service Generation Approach for Cross-origin Datasets WEB ENGINEERING (ICWE 2019), 2019, 11496 : 374 - 390
- [5] Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 653 - 667
- [8] Careful Who You Trust: Studying the Pitfalls of Cross-Origin Communication ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 110 - 122
- [9] Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks 27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
- [10] CSP & Co. Can Save Us from a Rogue Cross-Origin Storage Browser Network! But for How Long? PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 170 - 172