×
  • Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
 

Csrf not all defenses are created equal

by Application Security Consultant at Defensium llc on Nov 18, 2013

  • 694 views

A description of Cross-site request forgery (CSRF) attacks and defenses, with a focus on the commonly used libraries and functions which are used for CSRF defense. This presentation goes into each of ...

A description of Cross-site request forgery (CSRF) attacks and defenses, with a focus on the commonly used libraries and functions which are used for CSRF defense. This presentation goes into each of them, and shows it's strengths, weaknesses, and shortcomings.

Statistics

Views

Total Views
694
Views on SlideShare
669
Embed Views
25

Actions

Likes
0
Downloads
4
Comments
0

5 Embeds 25

http://www.defensium.com 14
http://defensium.com 5
http://cellenzehosting.com 3
http://new.defensium.com 2
https://www.linkedin.com 1

Accessibility

Categories

Upload Details

Uploaded via SlideShare as OpenOffice

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
Post Comment
Edit your comment

Csrf not all defenses are created equal Csrf not all defenses are created equal Presentation Transcript