I Spy with My Little Eye: Analysis and Detection of Spying Browser Extensions
暂无分享,去创建一个
Ponnurangam Kumaraguru | Liang Zhang | Ayush Shah | Bimal Viswanath | Saravana Kumar | Anupama Aggarwal
[1] John C. Mitchell,et al. Third-Party Web Tracking: Policy and Technology , 2012, 2012 IEEE Symposium on Security and Privacy.
[2] Yuan Tian,et al. Analyzing the dangers posed by Chrome extensions , 2014, 2014 IEEE Conference on Communications and Network Security.
[3] Arnar Birgisson,et al. JSFlow: tracking information flow in JavaScript and its APIs , 2014, SAC.
[4] Gianluca Stringhini,et al. Ex-Ray: Detection of History-Leaking Browser Extensions , 2017, ACSAC.
[5] Andy Barnhart. In the palm of your hand , 1997 .
[6] Eugene Agichtein,et al. Ready to buy or just browsing?: detecting web searcher goals from interaction data , 2010, SIGIR.
[7] Marie-Francine Moens,et al. A survey on the application of recurrent neural networks to statistical language modeling , 2015, Comput. Speech Lang..
[8] Christopher Krügel,et al. A quantitative study of accuracy in system call-based malware detection , 2012, ISSTA 2012.
[9] Christopher Krügel,et al. Hulk: Eliciting Malicious Behavior in Browser Extensions , 2014, USENIX Security Symposium.
[10] Marco Pistoia,et al. Saving the world wide web from vulnerable JavaScript , 2011, ISSTA '11.
[11] Edward W. Felten,et al. Cookies That Give You Away: The Surveillance Implications of Web Tracking , 2015, WWW.
[12] Marianne Winslett,et al. VEX: Vetting Browser Extensions for Security Vulnerabilities , 2010, USENIX Security Symposium.
[13] Andrei Sabelfeld,et al. Information-Flow Security for a Core of JavaScript , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.
[14] Charles Reis,et al. Web browsers as operating systems: supporting robust and secure web programs , 2009 .
[15] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[16] Rich Caruana,et al. Model compression , 2006, KDD '06.
[17] Nick Nikiforakis,et al. Extended Tracking Powers: Measuring the Privacy Diffusion Enabled by Browser Extensions , 2017, WWW.
[18] M. Welling,et al. MLitB: Machine Learning in the Browser , 2014, PeerJ Comput. Sci..
[19] Stefan Savage,et al. Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser , 2017, CSET @ USENIX Security Symposium.
[20] Vern Paxson,et al. When Governments Hack Opponents: A Look at Actors and Technology , 2014, USENIX Security Symposium.
[21] Julien Lironcourt. Internet Security Seminar Analyzing Information Flow in JavaScript-based Browser Extensions , 2010 .
[22] Alan Cleary,et al. Information flow analysis for javascript , 2011, PLASTIC '11.
[23] Marianne Winslett,et al. Vetting browser extensions for security vulnerabilities with VEX , 2011, CACM.
[24] Mitsuaki Akiyama,et al. Efficient Dynamic Malware Analysis Based on Network Behavior Using Deep Learning , 2016, 2016 IEEE Global Communications Conference (GLOBECOM).
[25] Razvan Pascanu,et al. Malware classification with recurrent networks , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[26] Berin Martini,et al. An efficient implementation of deep convolutional neural networks on a mobile coprocessor , 2014, 2014 IEEE 57th International Midwest Symposium on Circuits and Systems (MWSCAS).
[27] Niels Provos,et al. Trends and Lessons from Three Years Fighting Malicious Extensions , 2015, USENIX Security Symposium.
[28] Vern Paxson,et al. Ad Injection at Scale: Assessing Deceptive Advertisement Modifications , 2015, 2015 IEEE Symposium on Security and Privacy.
[29] David Wetherall,et al. Detecting and Defending Against Third-Party Tracking on the Web , 2012, NSDI.
[30] Arvind Narayanan,et al. Online Tracking: A 1-million-site Measurement and Analysis , 2016, CCS.
[31] David Lazer,et al. Measuring Price Discrimination and Steering on E-commerce Web Sites , 2014, Internet Measurement Conference.
[32] Wei Meng,et al. Understanding Malvertising Through Ad-Injecting Browser Extensions , 2015, WWW.
[33] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[34] Sorin Lerner,et al. An empirical study of privacy-violating information flows in JavaScript web applications , 2010, CCS '10.
[35] Balachander Krishnamurthy,et al. Generating a privacy footprint on the internet , 2006, IMC '06.
[36] Tadayoshi Kohno,et al. Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016 , 2016, USENIX Security Symposium.
[38] Mohammad Zulkernine,et al. Effective detection of vulnerable and malicious browser extensions , 2014, Comput. Secur..