References
- Adida, Ben, "Sessionlock: securing web sessions against eavesdropping," in Proc. of 17th international conference on World Wide Web, pp. 517-524, April 21-25, 2008.
- Adida, Ben, "Beamauth: two-factor web authentication with a bookmark," in Proc. of 14th ACM conference on Computer and communications security, pp. 48-57, 2007.
- Dacosta, I., Chakradeo, S., Ahamad, M. and Traynor, P, "One-time cookies: preventing session hijacking attacks with stateless authentication tokens," Acm Transactions on Internet Technology, vol. 12, no. 1, pp. 336-345, June.2012.
- Dietz, M., Czeskis, A., Balfanz, D. and Wallach, D. S., "Origin-bound certificates: a fresh approach to strong client authentication for the web," in Proc. of 21st USENIX Security Symposium (USENIX Security 12), pp. 317-331, August 8-10, 2012.
- Juels, A., Jakobsson, M. and Jagatic, T. N, "Cache cookies for browser authentication," in Proc. of 2006 IEEE Symposium on Security and Privacy (S&P'06), pp. 301-305, May 21-24, 2006.
- Unger, T., Mulazzani, M., Frühwirt, D., Huber, M., Schrittwieser, S., and Weippl, E., "Shpf: Enhancing http(s) session security with browser fingerprinting," in Proc. of 2013 Eighth International Conference on Availability, Reliability and Security (ARES), pp.255-261, Sept 2-6, 2013.
- Krawczyk, Hugo, Mihir Bellare, and Ran Canetti, "Hmac: Keyed-hashing for message authentication," February 1997.
- Ende93, AlexChao, "Window.sessionStorage," last modified on Oct 27, 2015.
- Johns, M., Lekies, S., Braun, B. and Flesch, B, "BetterAuth: web authentication revisited," in Proc. of 28th Annual Computer Security Applications Conference, pp.169-178, December 03 -07, 2012.
- Hallam-Baker, Phillip, "Http integrity header," 2012.
- De Ryck, P., Desmet, L., Piessens, F. and Joosen, W, "SecSess: keeping your session tucked away in your browser," in Proc. of ACM Symposium on Applied Computing, pp.2171-2176, April 13-17, 2015.
- Wikipedia, "Zen Cart ," last modified on August 18, 2016.
- CVE Details, "Zen-cart : Vulnerability Statistics."
- D. Wichers, "Owasp top 10," OWASP Foundation, 2013.
- Franks, J., Hallam-Baker, P., Hostetler, J., Lawrence, S., Leach, P., Luotonen, A. and Stewart, L, "HTTP authentication: Basic and digest access authentication," No. RFC 2617, 1999.
- Gebotys, C. H., White, B. A. and Mateos, E, "Preaveraging and carry propagate approaches to side-channel analysis of HMAC-SHA256," ACM Transactions on Embedded Computing Systems (TECS), vol. 15, no. 1, pp. 1-19, 2016.
- Berners-Lee T, Fielding R, Masinter L, "Uniform Resource Identifiers (URI): Generic Syntax," Staff.kmutt.ac.th, vol. 4, no. 3, pp. 84-87, 2005.
- Wei, K. J., Lee, J. S., and Chen, S. J, "Enhancing the Security of Credit Card Transaction based on Visual DSC," Ksii Transactions on Internet & Information Systems, vol. 9, no. 3, pp. 1231-1245, 2016. https://doi.org/10.3837/tiis.2015.03.022
- Wei Guo, "Security analysis and construction of chaotic Hash function," Southwest Jiaotong University, China, 2011.
- HE Run-min and MA Jun, "Analysis safety of SHA-256 algorithm," Electronic Design Engineering, vol.22, no.3, pp.31-33, 2014.
- Saini, Vineet, Q. Duan, and V. Paruchuri, "Threat modeling using attack trees," Journal of Computing Sciences in Colleges, vol.23, no.4, pp.124-131, 2008.
- Ismail, Reem Jafar. "A Secure Session Management Based on Threat Modeling," Iraqi Journal of Science, vol.54, no.4 (5), pp.1176-1182, 2013.