메뉴 건너뛰기




Volumn , Issue , 2011, Pages 115-130

Verified security for browser extensions

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; COMPLIANCE CONTROL; DIGITAL STORAGE; SEMANTICS; SENSITIVE DATA; WEB BROWSERS;

EID: 80052015113     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2011.36     Document Type: Conference Paper
Times cited : (99)

References (36)
  • 1
    • 0037842787 scopus 로고    scopus 로고
    • The SLAM project: Debugging system software via static analysis
    • T. Ball and S. K. Rajamani. The SLAM project: Debugging system software via static analysis. In ACM POPL, 2002.
    • (2002) ACM POPL
    • Ball, T.1    Rajamani, S.K.2
  • 3
    • 85166275153 scopus 로고    scopus 로고
    • Protecting browsers from extension vulnerabilities
    • A. Barth, A. P. Felt, and P. Saxena. Protecting browsers from extension vulnerabilities. In NDSS, 2010.
    • (2010) NDSS
    • Barth, A.1    Felt, A.P.2    Saxena, P.3
  • 4
    • 80052006758 scopus 로고    scopus 로고
    • CA Technologies. Virus details: Win32/clspring family. http://www.ca.com/us/securityadvisor/virusinfo/virus.aspx?ID=42280, 2006.
    • (2006) Virus Details: Win32/Clspring Family
  • 5
    • 80051988347 scopus 로고    scopus 로고
    • Type-preserving compilation of end-to-end verification of security enforcement
    • J. Chen, R. Chugh, and N. Swamy. Type-preserving compilation of end-to-end verification of security enforcement. In ACM PLDI, 2010.
    • (2010) ACM PLDI
    • Chen, J.1    Chugh, R.2    Swamy, N.3
  • 7
    • 47249164288 scopus 로고    scopus 로고
    • Z3: An efficient SMT solver
    • L. de Moura and N. Bjorner. Z3: An efficient SMT solver. In TACAS, 2008.
    • (2008) TACAS
    • De Moura, L.1    Bjorner, N.2
  • 8
    • 77950799484 scopus 로고    scopus 로고
    • Analyzing information flow in JavaScript-based browser extensions
    • M. Dhawan and V Ganapathy. Analyzing information flow in JavaScript-based browser extensions. In ACSAC, 2009.
    • (2009) ACSAC
    • Dhawan, M.1    Ganapathy, V.2
  • 11
    • 84864749040 scopus 로고    scopus 로고
    • RePriv: Re-envisioning in-browser privacy
    • M. Fredrikson and B. Livshits. RePriv: Re-envisioning in- browser privacy. In IEEE S&P, 2011.
    • (2011) IEEE S&P
    • Fredrikson, M.1    Livshits, B.2
  • 15
    • 77950853552 scopus 로고    scopus 로고
    • Secure web browsing with the OP web browser
    • C. Grier, S. Tang, and S. T. King. Secure web browsing with the OP web browser. In IEEE S&P, 2008.
    • (2008) IEEE S&P
    • Grier, C.1    Tang, S.2    King, S.T.3
  • 16
    • 33645587554 scopus 로고    scopus 로고
    • Model checking and modular verification
    • O. Grumberg and D. E. Long. Model checking and modular verification. ACM TOPLAS, 16, 1994.
    • ACM TOPLAS , vol.16 , pp. 1994
    • Grumberg, O.1    Long, D.E.2
  • 17
    • 84890883068 scopus 로고    scopus 로고
    • GateKeeper: Mostly static enforcement of security and reliability policies for JavaScript code
    • S. Guarnieri and B. Livshits. GateKeeper: Mostly static enforcement of security and reliability policies for JavaScript code. In USENIX Security, 2009.
    • (2009) USENIX Security
    • Guarnieri, S.1    Livshits, B.2
  • 22
    • 77955000017 scopus 로고    scopus 로고
    • Language support for extensible web browsers
    • B. Lerner and D. Grossman. Language support for extensible web browsers. In APLWACA, 2010.
    • (2010) APLWACA
    • Lerner, B.1    Grossman, D.2
  • 26
    • 80051997549 scopus 로고    scopus 로고
    • ConScript: Specifying and enforcing fine-grained security policies for javascript in the browser
    • L. Meyerovich and B. Livshits. ConScript: Specifying and enforcing fine-grained security policies for Javascript in the browser. In oakland, 2010.
    • (2010) Oakland
    • Meyerovich, L.1    Livshits, B.2
  • 27
    • 78650102256 scopus 로고    scopus 로고
    • Mozilla Foundation. How many Firefox users use addons? http://blog.mozilla.com/addons/2009/08/11/how-many-firefox-users-use-add-ons/, 2009.
    • (2009) How Many Firefox Users use Addons?
  • 29
    • 85177638687 scopus 로고    scopus 로고
    • A theory of typed coercions and its applications
    • N. Swamy, M. Hicks, and G. Bierman. A theory of typed coercions and its applications. In ACM ICFP, 2009.
    • (2009) ACM ICFP
    • Swamy, N.1    Hicks, M.2    Bierman, G.3
  • 30
    • 85040949627 scopus 로고    scopus 로고
    • Enforcing stateful authorization and information flow policies in fine
    • N. Swamy, J. Chen, and R. Chugh. Enforcing stateful authorization and information flow policies in Fine. In ESOP, 2010.
    • (2010) ESOP
    • Swamy, N.1    Chen, J.2    Chugh, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.