Chapter 28 – Man-in-the-Browser Attacks in Modern Web Browsers
暂无分享,去创建一个
[1] V. N. Venkatakrishnan,et al. Enhancing web browser security against malware extensions , 2007, Journal in Computer Virology.
[2] Marianne Winslett,et al. VEX: Vetting Browser Extensions for Security Vulnerabilities , 2010, USENIX Security Symposium.
[3] Ville Leppänen,et al. Browser extension-based man-in-the-browser attacks against Ajax applications with countermeasures , 2012, CompSysTech '12.
[4] Kevin Curran,et al. Man in the Browser Attacks , 2012, Int. J. Ambient Comput. Intell..
[5] Richard J. Enbody,et al. Spying on the browser: dissecting the design of malicious extensions , 2011, Netw. Secur..
[6] Galen C. Hunt,et al. Detours: binary interception of Win32 functions , 1999 .
[7] Proteus Valre Kresten. Windows Filtering Platform , 2012 .
[8] Marianne Winslett,et al. Vetting browser extensions for security vulnerabilities with VEX , 2011, CACM.
[9] M. Ståhlberg. THE TROJAN MONEY SPINNER , 2007 .
[10] Michael W. Godfrey,et al. A reference architecture for Web browsers , 2005, 21st IEEE International Conference on Software Maintenance (ICSM'05).