Vulnerabilities and Defensive Mechanism of CSRF
||International Journal of Computer Trends and Technology (IJCTT)||
|© 2014 by IJCTT Journal|
|Year of Publication : 2014|
|Authors : Purnima Khurana , Purnima Bindal|
|DOI : 10.14445/22312803/IJCTT-V13P135|
Purnima Khurana , Purnima Bindal. "Vulnerabilities and Defensive Mechanism of CSRF". International Journal of Computer Trends and Technology (IJCTT) V13(4):171-174, July 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
 Rupali D. Kombade, Dr. B.B. Meshram,” CSRF Vulnerabilities and defence technique”, I. J. Computer Network and Information Security, February 2012.
 Adam Barth, Collin Jackson, John C. Mitchell, “ Robust Defenses for Cross-Site Request Forgery” , Oct.2008.
 William Zeller and Edward W. Felten, “ Cross-Site Request Forgeries: Exploitation and Prevention,” The New York Times, 2008.
 Bill Zeller (2008) Popular Websites Vulnerable to Croos-Site Request Forgery Attacks webpage on Freedom to Tinker. [Online]. Available: https://freedom-to-tinker.com/blog/wzeller/popular-websites-vulnerable-cross-site-request-forgery-attacks/
 Difference Between XSS and CSRF webpage on DifferenceBetween.info. [Online]. Available: http://www.differencebetween.info/difference-between-xss-and-csrf
 Niraj Bhatt (2010) Cross Site Scripting (XSS) vs. Cross Site Request Forgery (CSRF) webpage on Wordpress.com. [Online]. Available: http://nirajrules.wordpress.com/2010/01/16/cross-site-scripting-xss-vs-cross-site-request-forgery/
 John Melton (2012) CSRF prevention in java webpage on WhiteHat Security. [Online]. Available: https://blog.whitehatsec.com/tag/synchronizer-token /
Web Application, Vulnerability, Attacks, Defensive measures, Cross-Site Request forgery Introduction