Downloads: 130 | Views: 285 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015 | Popularity: 6.5 / 10
Attacks in HTML5
Kailash L. Methawani, Prof. Avinash P. Wadhe
Abstract: Now days, a web user can enjoy chatting, playing games and Internet banking from simple structured text. The browsers have changed from being a simple structured display to supporting complex multimedia application. All these applications have something in common, they can be run on different platforms and in some cases they will run offline. This is possible due to new features in latest specification HTML, specifically, drawing featured canvas. In this paper, after providing some background to HTML5, we are going to discuss attack surface and possible threats. - CSRF and leveraging CORS to bypass SOP - Attacking WebSQL and client side SQL injection - ClickJacking & Phishing by mixing layers and iframe - Stealing information from Storage and Global variables - DOM injections and Hijacking with HTML 5
Keywords: HTML, HTML5, WebSQL, CSS3
Edition: Volume 4 Issue 5, May 2015
Pages: 760 - 762
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 1998 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 716 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 696 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 696 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 685 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera