-
1
-
-
85076215365
-
-
Google Inc., “Google chrome webstore.” https://chrome.google.com/webstore/.
-
Google Chrome Webstore
-
-
-
3
-
-
84870423882
-
-
Google Inc., “Chromium os.” http://www.chromium.org/chromium-os.
-
Chromium Os
-
-
-
5
-
-
85076215429
-
-
Microsoft, “Metro style app development,” 2012. http://msdn.microsoft.com/en-us/windows/apps/.
-
(2012)
Metro Style App Development
-
-
-
8
-
-
77955220343
-
A symbolic execution framework for javascript
-
P. Saxena, D. Akhawe, S. Hanna, F. Mao, S. Mc-Camant, and D. Song, “A symbolic execution framework for javascript,” in Proceedings of the 2010 IEEE Symposium on Security and Privacy, pp. 513–528.
-
Proceedings of the 2010 IEEE Symposium on Security and Privacy
, pp. 513-528
-
-
Saxena, P.1
Akhawe, D.2
Hanna, S.3
Mao, F.4
Mc-Camant, S.5
Song, D.6
-
9
-
-
85076320754
-
VEX: Vetting browser extensions for security vulnerabilities
-
S. Bandhakavi, S. T. King, P. Madhusudan, and M. Winslett, “Vex: vetting browser extensions for security vulnerabilities,” in Proceedings of the 19th USENIX conference on Security, 2010.
-
(2010)
Proceedings of the 19th USENIX Conference on Security
-
-
Bandhakavi, S.1
King, S.T.2
Madhusudan, P.3
Winslett, M.4
-
11
-
-
84890883068
-
Gatekeeper: Mostly static enforcement of security and reliability policies for JavaScript code
-
S. Guarnieri and B. Livshits, “Gatekeeper: mostly static enforcement of security and reliability policies for JavaScript code,” in Usenix Security, 2009.
-
(2009)
Usenix Security
-
-
Guarnieri, S.1
Livshits, B.2
-
12
-
-
77955860750
-
Escudo: A fine-grained protection model for web browsers
-
K. Jayaraman, W. Du, B. Rajagopalan, and S. Chapin, “Escudo: A fine-grained protection model for web browsers,” in Proceedings of the 30th International Conference on Distributed Computing Systems, pp. 231–240, IEEE, 2010.
-
(2010)
Proceedings of the 30th International Conference on Distributed Computing Systems
, pp. 231-240
-
-
Jayaraman, K.1
Du, W.2
Rajagopalan, B.3
Chapin, S.4
-
13
-
-
0016555241
-
The protection of information in computer systems
-
J. Saltzer and M. Schroeder, “The protection of information in computer systems,” Proceedings of the IEEE, vol. 63, no. 9, pp. 1278–1308, 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
20
-
-
80755144024
-
App isolation: Get the security of multiple browsers with just one
-
E. Y. Chen, J. Bau, C. Reis, A. Barth, and C. Jackson, “App isolation: get the security of multiple browsers with just one,” in Proceedings of the 18th ACM conference on Computer and communications security, pp. 227–238, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 227-238
-
-
Chen, E.Y.1
Bau, J.2
Reis, C.3
Barth, A.4
Jackson, C.5
-
21
-
-
80052015113
-
Verified security for browser extensions
-
A. Guha, M. Fredrikson, B. Livshits, and N. Swamy, “Verified security for browser extensions,” in Proceedings of the IEEE Symposium on Security and Privacy, pp. 115–130, 2011.
-
(2011)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 115-130
-
-
Guha, A.1
Fredrikson, M.2
Livshits, B.3
Swamy, N.4
-
23
-
-
85166275153
-
Protecting browsers from extension vulnerabilities
-
A. Barth, A. Felt, P. Saxena, and A. Boodman, “Protecting browsers from extension vulnerabilities,” in Proceedings of the 17th Network and Distributed System Security Symposium, 2010.
-
(2010)
Proceedings of the 17th Network and Distributed System Security Symposium
-
-
Barth, A.1
Felt, A.2
Saxena, P.3
Boodman, A.4
-
25
-
-
80755127060
-
Short paper: A look at smartphone permission models
-
K. W. Y. Au, Y. F. Zhou, Z. Huang, P. Gill, and D. Lie, “Short paper: A look at smartphone permission models,” in Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, 2011.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
-
-
Au, K.W.Y.1
Zhou, Y.F.2
Huang, Z.3
Gill, P.4
Lie, D.5
-
38
-
-
84874258826
-
-
The Dojo Foundation, “The dojo toolkit.” http://dojotoolkit.org/.
-
The Dojo Toolkit
-
-
-
39
-
-
85076205048
-
-
GitHub Inc., “Edit like an ace.” https://github.com/blog/905-edit-like-an-ace.
-
Edit like An Ace
-
-
-
40
-
-
85076226798
-
-
“Oauth.” http://oauth.net/.
-
-
-
-
45
-
-
85091966368
-
Wedge: Splitting applications into reduced-privilege compartments
-
A. Bittau, P. Marchenko, M. Handley, and B. Karp, “Wedge: splitting applications into reduced-privilege compartments,” in Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation, pp. 309–322, 2008.
-
(2008)
Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
, pp. 309-322
-
-
Bittau, A.1
Marchenko, P.2
Handley, M.3
Karp, B.4
-
46
-
-
41149109640
-
Protection and communication abstractions for web browsers in mashupos
-
Oct
-
H. J. Wang, X. Fan, J. Howell, and C. Jackson, “Protection and communication abstractions for web browsers in mashupos,” SIGOPS Oper. Syst. Rev., vol. 41, pp. 1–16, Oct. 2007.
-
(2007)
SIGOPS Oper. Syst. Rev.
, vol.41
, pp. 1-16
-
-
Wang, H.J.1
Fan, X.2
Howell, J.3
Jackson, C.4
-
47
-
-
77954608267
-
The multi-principal os construction of the gazelle web browser
-
H. Wang, C. Grier, A. Moshchuk, S. King, P. Choudhury, and H. Venter, “The multi-principal os construction of the gazelle web browser,” in Proceedings of the 18th USENIX security symposium, pp. 417–432, 2009.
-
(2009)
Proceedings of the 18th USENIX Security Symposium
, pp. 417-432
-
-
Wang, H.1
Grier, C.2
Moshchuk, A.3
King, S.4
Choudhury, P.5
Venter, H.6
-
49
-
-
85046879731
-
Permission re-delegation: Attacks and defenses
-
A. P. Felt, H. J. Wang, A. Moshchuk, S. Hanna, and E. Chin, “Permission re-delegation: Attacks and defenses,” in Proceedings of the 20th USENIX conference on Security, 2011.
-
(2011)
Proceedings of the 20th USENIX Conference on Security
-
-
Felt, A.P.1
Wang, H.J.2
Moshchuk, A.3
Hanna, S.4
Chin, E.5
-
50
-
-
70449632684
-
CLAMP: Practical prevention of large-scale data leaks
-
B. Parno, J. M. McCune, D. Wendlandt, D. G. Andersen, and A. Perrig, “Clamp: Practical prevention of large-scale data leaks,” in Proceedings of the 30th IEEE Symposium on Security and Privacy, pp. 154–169, 2009.
-
(2009)
Proceedings of the 30th IEEE Symposium on Security and Privacy
, pp. 154-169
-
-
Parno, B.1
McCune, J.M.2
Wendlandt, D.3
Andersen, D.G.4
Perrig, A.5
|