Protecting Browsers from Extension Vulnerabilities
暂无分享,去创建一个
[1] Martín Abadi,et al. XFI: software guards for system address spaces , 2006, OSDI '06.
[2] Dawn Xiaodong Song,et al. Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense , 2009, USENIX Security Symposium.
[3] Brian N. Bershad,et al. Improving the reliability of commodity operating systems , 2005, TOCS.
[4] Collin Jackson,et al. Rootkits for JavaScript Environments , 2009, WOOT.
[5] Jon Howell,et al. Leveraging Legacy Code to Deploy Desktop Applications on the Web , 2008, OSDI.
[6] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[7] Helen J. Wang,et al. The Multi-Principal OS Construction of the Gazelle Web Browser , 2009, USENIX Security Symposium.
[8] George C. Necula,et al. SafeDrive: safe and recoverable extensions using language-based techniques , 2006, OSDI '06.
[9] Samuel T. King,et al. How I Learned to Stop Worrying and Love Plugins , 2009 .
[10] Adam Barth,et al. The Security Architecture of the Chromium Browser , 2009 .
[11] Helen J. Wang,et al. Protection and communication abstractions for web browsers in MashupOS , 2007, SOSP.
[12] V. N. Venkatakrishnan,et al. Enhancing web browser security against malware extensions , 2007, Journal in Computer Virology.
[13] C. Jackson. Beware of Finer-Grained Origins , 2008 .
[14] Bennet S. Yee,et al. Native Client: A Sandbox for Portable, Untrusted x86 Native Code , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[15] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[16] Dan Boneh,et al. Protecting browser state from web privacy attacks , 2006, WWW '06.
[17] Hao Chen,et al. OMash: enabling secure web mashups via object abstractions , 2008, CCS.
[18] A. Barth,et al. Attacks on JavaScript Mashup Communication , 2009 .
[19] Samuel T. King,et al. Secure Web Browsing with the OP Web Browser , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).