Cargando…
Web Application Obfuscation: '-WAFsEvasionFiltersalert(Obfuscation)-'
Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation...
Autores principales: | , , , |
---|---|
Lenguaje: | eng |
Publicado: |
Elsevier
2010
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1412534 |
_version_ | 1780923897358581760 |
---|---|
author | Heiderich, Mario Vela Nava, Eduardo Alberto Heyes, Gareth Lindsay, David |
author_facet | Heiderich, Mario Vela Nava, Eduardo Alberto Heyes, Gareth Lindsay, David |
author_sort | Heiderich, Mario |
collection | CERN |
description | Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new ty |
id | cern-1412534 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2010 |
publisher | Elsevier |
record_format | invenio |
spelling | cern-14125342021-04-22T00:44:58Zhttp://cds.cern.ch/record/1412534engHeiderich, MarioVela Nava, Eduardo AlbertoHeyes, GarethLindsay, DavidWeb Application Obfuscation: '-WAFsEvasionFiltersalert(Obfuscation)-'Computing and ComputersWeb applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems. Find out how an attacker would bypass different types of security controls, how these very security controls introduce new tyElsevieroai:cds.cern.ch:14125342010 |
spellingShingle | Computing and Computers Heiderich, Mario Vela Nava, Eduardo Alberto Heyes, Gareth Lindsay, David Web Application Obfuscation: '-WAFsEvasionFiltersalert(Obfuscation)-' |
title | Web Application Obfuscation: '-WAFsEvasionFiltersalert(Obfuscation)-' |
title_full | Web Application Obfuscation: '-WAFsEvasionFiltersalert(Obfuscation)-' |
title_fullStr | Web Application Obfuscation: '-WAFsEvasionFiltersalert(Obfuscation)-' |
title_full_unstemmed | Web Application Obfuscation: '-WAFsEvasionFiltersalert(Obfuscation)-' |
title_short | Web Application Obfuscation: '-WAFsEvasionFiltersalert(Obfuscation)-' |
title_sort | web application obfuscation: '-wafsevasionfiltersalert(obfuscation)-' |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1412534 |
work_keys_str_mv | AT heiderichmario webapplicationobfuscationwafsevasionfiltersalertobfuscation AT velanavaeduardoalberto webapplicationobfuscationwafsevasionfiltersalertobfuscation AT heyesgareth webapplicationobfuscationwafsevasionfiltersalertobfuscation AT lindsaydavid webapplicationobfuscationwafsevasionfiltersalertobfuscation |