The Most Dangerous Code in the Browser
暂无分享,去创建一个
[1] Sean W. Smith. Humans in the Loop: Human-Computer Interaction and Security , 2003, IEEE Secur. Priv..
[2] Norman Hardy,et al. The Confused Deputy: (or why capabilities might have been invented) , 1988, OPSR.
[3] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[4] Deian Stefan,et al. Protecting Users by Confining JavaScript with COWL , 2014, OSDI.
[5] Niels Provos,et al. Preventing Privilege Escalation , 2003, USENIX Security Symposium.
[6] Adam Barth,et al. The Web Origin Concept , 2011, RFC.
[7] Christopher Krügel,et al. Hulk: Eliciting Malicious Behavior in Browser Extensions , 2014, USENIX Security Symposium.
[8] David A. Wagner,et al. An Evaluation of the Google Chrome Extension Security Architecture , 2012, USENIX Security Symposium.
[9] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[10] Vern Paxson,et al. Ad Injection at Scale: Assessing Deceptive Advertisement Modifications , 2015, 2015 IEEE Symposium on Security and Privacy.
[11] David A. Wagner,et al. How to Ask for Permission , 2012, HotSec.
[12] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[13] Julien Lironcourt. Internet Security Seminar Analyzing Information Flow in JavaScript-based Browser Extensions , 2010 .
[14] Adam Barth,et al. Protecting Browsers from Extension Vulnerabilities , 2010, NDSS.
[15] David A. Wagner,et al. The Effectiveness of Application Permissions , 2011, WebApps.
[16] Benjamin Livshits,et al. Verified Security for Browser Extensions , 2011, 2011 IEEE Symposium on Security and Privacy.