{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:17:57Z","timestamp":1740097077384,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642554148"},{"type":"electronic","value":"9783642554155"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55415-5_3","type":"book-chapter","created":{"date-parts":[[2014,5,11]],"date-time":"2014-05-11T22:18:10Z","timestamp":1399846690000},"page":"30-43","source":"Crossref","is-referenced-by-count":11,"title":["Model-Based Detection of CSRF"],"prefix":"10.1007","author":[{"given":"Marco","family":"Rocchetto","sequence":"first","affiliation":[]},{"given":"Mart\u00edn","family":"Ochoa","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Torabi Dashti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Akhawe, D., Barth, A., Lam, P.E., Mitchell, J., Song, D.: Towards a Formal Foundation of Web Security. In: 2010 23rd IEEE Computer Security Foundations Symposium (CSF), pp. 290\u2013304 (2010)","DOI":"10.1109\/CSF.2010.27"},{"key":"3_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-642-28756-5_19","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A. Armando","year":"2012","unstructured":"Armando, A., et al.: The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures. In: Flanagan, C., K\u00f6nig, B. (eds.) TACAS 2012. LNCS, vol.\u00a07214, pp. 267\u2013282. Springer, Heidelberg (2012), \n                    \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-28756-5_19"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"B\u00fcchler, M., Oudinet, J., Pretschner, A.: SPaCiTE \u2013 Web Application Testing Engine. In: 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation (ICST), pp. 858\u2013859 (2012)","DOI":"10.1109\/ICST.2012.187"},{"key":"3_CR4","unstructured":"Christensen, E., Curbera, F., Meredith, G., Weerawarana, S., et al.: Web Services Description Language (WSDL) 1.1 (2001)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Dias Neto, A.C., Subramanyan, R., Vieira, M., Travassos, G.H.: A Survey on Model-based Testing Approaches: A Systematic Review. In: WEASELTech 2007, pp. 31\u201336. ACM (2007)","DOI":"10.1145\/1353673.1353681"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Dolev, D., Yao, A.: On the Security of Public-Key Protocols. IEEE Transactions on Information Theory\u00a02(29) (1983)","DOI":"10.1109\/TIT.1983.1056650"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-14215-4_7","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"A. Doup\u00e9","year":"2010","unstructured":"Doup\u00e9, A., Cova, M., Vigna, G.: Why Johnny Can\u2019t Pentest: An Analysis of Black-Box Web Vulnerability Scanners. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol.\u00a06201, pp. 111\u2013131. Springer, Heidelberg (2010)"},{"key":"3_CR8","unstructured":"Jackson, D.: Software Abstractions: Logic, Language, and Analysis. MIT Press (2012)"},{"key":"3_CR9","unstructured":"OASIS. Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0 (2005), \n                    \n                      http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=security"},{"key":"3_CR10","unstructured":"OWASP. OWASP Cross Site Request Forgery (2013), https:\/\/www.owasp.org\/index.php\/Cross-Site_Request_Forgery_(CSRF)"},{"key":"3_CR11","unstructured":"Schemers, R., Allbery, R.: WebAuth v3 technical specification (2009), \n                    \n                      http:\/\/webauth.stanford.edu\/protocol.html"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1145\/1059524.1059554","volume-title":"Proceedings of the 1st Annual Conference on Information Security Curriculum Development, InfoSecCD 2004","author":"T. Thornburgh","year":"2004","unstructured":"Thornburgh, T.: Social Engineering: The \u201cDark Art\u201d. In: Proceedings of the 1st Annual Conference on Information Security Curriculum Development, InfoSecCD 2004, pp. 133\u2013135. ACM, New York (2004)"},{"key":"3_CR13","unstructured":"Tidwell, T., Larson, R., Fitch, K., Hale, J.: Modeling Internet Attacks. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and security, vol.\u00a059 (2001)"},{"key":"3_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-25271-6_1","volume-title":"Formal Methods for Components and Objects","author":"D. Oheimb von","year":"2011","unstructured":"von Oheimb, D., M\u00f6dersheim, S.: ASLan++ \u2014 A formal security specification language for distributed systems. In: Aichernig, B.K., de Boer, F.S., Bonsangue, M.M. (eds.) FMCO 2010. LNCS, vol.\u00a06957, pp. 1\u201322. Springer, Heidelberg (2011)"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55415-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T16:02:31Z","timestamp":1558886551000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55415-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642554148","9783642554155"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55415-5_3","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2014]]}}}