-
2
-
-
84912129060
-
-
"CSS, " http://www.w3.org/Style/CSS/.
-
CSS
-
-
-
3
-
-
84912128087
-
-
"CSS3, " http://www.w3.org/Style/CSS/current-work.en.html.
-
CSS3
-
-
-
4
-
-
84912107219
-
-
"HTML5 IFrame Sandbox, " http://www.w3.org/TR/2011/WD-html5-20110525/the-IFrame-element.html# attr-IFrame-sandbox.
-
HTML5 IFrame Sandbox
-
-
-
7
-
-
84912063242
-
-
"NotScripts for Chrome, " https://chrome.google.com/webstore/detail/notscripts/odjhifogjcknibkahlpidmdajjpkkcfn.
-
NotScripts for Chrome
-
-
-
11
-
-
35348884907
-
Exposing private information by timing web applications
-
A. Bortz and D. Boneh, "Exposing private information by timing web applications, " in WWW, 2007, pp. 621-628.
-
(2007)
WWW
, pp. 621-628
-
-
Bortz, A.1
Boneh, D.2
-
13
-
-
77955197190
-
Side-channel leaks in web applications: A reality today, a challenge tomorrow
-
S. Chen, R. Wang, X. Wang, and K. Zhang, "Side-channel leaks in web applications: A reality today, a challenge tomorrow, " in IEEE Symposium on Se curity and Privacy, 2010, pp. 191-206.
-
(2010)
IEEE Symposium on Se Curity and Privacy
, pp. 191-206
-
-
Chen, S.1
Wang, R.2
Wang, X.3
Zhang, K.4
-
16
-
-
0010512569
-
A guide to understanding covert channel analysis of trusted systems
-
Tech. Rep
-
V. Gligor, "A guide to understanding covert channel analysis of trusted systems, " National Computer Security Center, Tech. Rep., 1993.
-
(1993)
National Computer Security Center
-
-
Gligor, V.1
-
17
-
-
80051944229
-
Dns cache snooping or snooping the cache for fun and profit
-
Tech. Rep
-
L. Grangeia, "DNS cache snooping or snooping the cache for fun and profit, " SideStep Seguranca Digitial, Tech. Rep., 2004.
-
(2004)
SideStep Seguranca Digitial
-
-
Grangeia, L.1
-
18
-
-
84869439440
-
Scriptless attacks: Stealing the pie without touching the sill
-
M. Heiderich, M. Niemietz, F. Schuster, T. Holz, and J. Schwenk, " Scriptless attacks: stealing the pie without touching the sill," in ACM Conference on Computer and Communications Security, 2012, pp. 760-771.
-
(2012)
ACM Conference on Computer and Communications Security
, pp. 760-771
-
-
Heiderich, M.1
Niemietz, M.2
Schuster, F.3
Holz, T.4
Schwenk, J.5
-
19
-
-
34250634485
-
Protecting browser state from web privacy attacks
-
C. Jackson,A. Bortz,D. Boneh,J. C. Mitchell Protecting browser state from web privacy attacks in WWW 2006 737-744.
-
(2006)
WWW
, pp. 737-744
-
-
Jackson, C.1
Bortz, A.2
Boneh, D.3
Mitchell, J.C.4
-
20
-
-
34250687159
-
Invasive browser sniffing and countermeasures
-
M. Jakobsson and S. Stamm, "Invasive browser sniffing and countermeasures, " in WWW, 2006, pp. 523-532.
-
(2006)
WWW
, pp. 523-532
-
-
Jakobsson, M.1
Stamm, S.2
-
21
-
-
84860725517
-
Feasibility and real-world implications of web browser history detection
-
A. Janc and L. Olejnik, "Feasibility and real-world implications of web browser history detection, " in Web 2.0 security and privacy conference, 2010.
-
(2010)
Web 2.0 Security and Privacy Conference
-
-
Janc, A.1
Olejnik, L.2
-
22
-
-
78649998785
-
An empirical study of privacy-violating information flows in javascript web applications
-
D. Jang, R. Jhala, S. Lerner, and H. Shacham, " An empirical study of privacy-violating information flows in javascript web applications," in ACM Conference on Computer and Communications Security, 2010, pp. 270-283.
-
(2010)
ACM Conference on Computer and Communications Security
, pp. 270-283
-
-
Jang, D.1
Jhala, R.2
Lerner, S.3
Shacham, H.4
-
28
-
-
77954584716
-
Reining in the web with content security policy
-
S. Stamm, B. Sterne, and G. Markham, "Reining in the web with content security policy, " in WWW, 2010, pp. 921-930.
-
(2010)
WWW
, pp. 921-930
-
-
Stamm, S.1
Sterne, B.2
Markham, G.3
-
29
-
-
80051955689
-
I still know what you visited last summer: Leaking browsing history via user interaction and side channel attacks
-
Z. Weinberg, E. Y. Chen, P. R. Jayaraman, and C. Jackson, " I still know what you visited last summer: Leaking browsing history via user interaction and side channel attacks," in IEEE Symposium on Security and Privacy, 2011, pp. 147-161.
-
(2011)
IEEE Symposium on Security and Privacy
, pp. 147-161
-
-
Weinberg, Z.1
Chen, E.Y.2
Jayaraman, P.R.3
Jackson, C.4
-
30
-
-
85094661726
-
Organization-based analysis of web-object sharing and caching
-
A. Wolman, G. M. Voelker, N. Sharma, N. Cardwell, M. Brown, T. Landray, D. Pinnel, A. R. Karlin, and H. M. Levy, "Organization-based analysis of web-object sharing and caching, " in USENIX Symposium on Internet Technologies and Systems, 1999.
-
(1999)
USENIX Symposium on Internet Technologies and Systems
-
-
Wolman, A.1
Voelker, G.M.2
Sharma, N.3
Cardwell, N.4
Brown, M.5
Landray, T.6
Pinnel, D.7
Karlin, A.R.8
Levy, H.M.9
-
31
-
-
77955214796
-
A practical attack to de-anonymize social network users
-
G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, "A practical attack to de-anonymize social network users, " in IEEE Symposium on Security and Privacy, 2010, pp. 223-238.
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 223-238
-
-
Wondracek, G.1
Holz, T.2
Kirda, E.3
Kruegel, C.4
|