Privacy Leakage Attacks in Browsers by Colluding Extensions
暂无分享,去创建一个
Vijay Laxmi | Manoj Singh Gaur | Mauro Conti | Anil Saini | Tushar Singhal | V. Laxmi | M. Gaur | M. Conti | Anil Saini | Tushar Singhal
[1] V. N. Venkatakrishnan,et al. Extensible Web Browser Security , 2007, DIMVA.
[2] Pavel Laskov,et al. Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings , 2022, International Conference on Detection of intrusions and malware, and vulnerability assessment.
[3] Vinod Ganapathy,et al. Analyzing Information Flow in JavaScript-Based Browser Extensions , 2009, 2009 Annual Computer Security Applications Conference.
[4] Nattakant Utakrit. Review of Browser Extensions, a Man-in-the-Browser Phishing Techniques Targeting Bank Customers , 2009 .
[5] Marianne Winslett,et al. Vetting browser extensions for security vulnerabilities with VEX , 2011, CACM.
[6] Kevin Curran,et al. Man in the Browser Attacks , 2012, Int. J. Ambient Comput. Intell..
[7] Lei Liu,et al. Chrome Extensions: Threat Analysis and Countermeasures , 2012, NDSS.
[8] Vijay Laxmi,et al. The darker side of Firefox extension , 2013, SIN.
[9] Arnar Birgisson,et al. JSFlow: tracking information flow in JavaScript and its APIs , 2014, SAC.