-
1
-
-
84874550218
-
-
Alexa Top Sites. http://www.alexa.com/topsites/global.
-
Alexa Top Sites
-
-
-
4
-
-
85180622488
-
-
JavaScript Games. http://javascript.internet.com/games/.
-
JavaScript Games
-
-
-
5
-
-
85180623494
-
-
JSON. http://json.org/.
-
-
-
-
7
-
-
85180627420
-
-
Opera Mini. http://en.wikipedia.org/wiki/ Opera_Mini.
-
Opera Mini
-
-
-
9
-
-
85180628179
-
-
TC. http://pupa.da.ru/tc/.
-
-
-
-
12
-
-
84910677088
-
Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense
-
August
-
A. Barth, U. Berkeley, J. Weinberger, and D. Song. Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense. In Proc. of USENIX Security Symposium, August 2009.
-
(2009)
Proc. of USENIX Security Symposium
-
-
Barth, A.1
Berkeley, U.2
Weinberger, J.3
Song, D.4
-
15
-
-
33750703981
-
Latency and player actions in online games
-
M. Claypool and K. Claypool. Latency and player actions in online games. Commun. ACM, 49(11):40–45, 2006.
-
(2006)
Commun. ACM
, vol.49
, Issue.11
, pp. 40-45
-
-
Claypool, M.1
Claypool, K.2
-
19
-
-
84856138620
-
Mashupos: operating system abstractions for client mashups
-
J. Howell, C. Jackson, H. J. Wang, and X. Fan. Mashupos: operating system abstractions for client mashups. In HotOS, 2007.
-
(2007)
HotOS
-
-
Howell, J.1
Jackson, C.2
Wang, H. J.3
Fan, X.4
-
20
-
-
74049104017
-
Ripley: Automatically securing web 2.0 applications through replicated execution
-
B. L. K.Vikram, Abhishek Prateek. Ripley: Automatically securing web 2.0 applications through replicated execution. In CCS, 2009.
-
(2009)
CCS
-
-
Vikram, B. L. K.1
Prateek, Abhishek2
-
23
-
-
85076893377
-
Spyproxy: execution-based detection of malicious web content
-
A. Moshchuk, T. Bragin, D. Deville, S. D. Gribble, and H. M. Levy. Spyproxy: execution-based detection of malicious web content. In USENIX Security, 2007.
-
(2007)
USENIX Security
-
-
Moshchuk, A.1
Bragin, T.2
Deville, D.3
Gribble, S. D.4
Levy, H. M.5
-
25
-
-
57349143314
-
Flashproxy: transparently enabling rich web content via remote execution
-
A. Moshchuk, S. D. Gribble, and H. M. Levy. Flashproxy: transparently enabling rich web content via remote execution. In Proc. of ACM MobiSys, 2008.
-
(2008)
Proc. of ACM MobiSys
-
-
Moshchuk, A.1
Gribble, S. D.2
Levy, H. M.3
-
26
-
-
78650896178
-
Document structure integrity: A robust basis for cross-site scripting defense
-
Y. Nadji, P. Saxena, and D. Song. Document structure integrity: A robust basis for cross-site scripting defense. In Proc. of NDSS, 2009.
-
(2009)
Proc. of NDSS
-
-
Nadji, Y.1
Saxena, P.2
Song, D.3
-
27
-
-
85180627627
-
-
NSA. SELinux. http://www.nsa.gov/research/selinux/.
-
SELinux
-
-
-
29
-
-
85080711655
-
The ghost in the browser: analysis of web-based malware
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The ghost in the browser: analysis of web-based malware. In USENIX HotBots, 2007.
-
(2007)
USENIX HotBots
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
31
-
-
85076780225
-
Browsershield: Vulnerability-driven filtering of dynamic html
-
C. Reis, J. Dunagan, H. Wang, O. Dubrovsky, and S. Esmeir. Browsershield: Vulnerability-driven filtering of dynamic html. In Proc. of OSDI, 2006.
-
(2006)
Proc. of OSDI
-
-
Reis, C.1
Dunagan, J.2
Wang, H.3
Dubrovsky, O.4
Esmeir, S.5
-
32
-
-
84898939129
-
Isolating web programs in modern browser architectures
-
C. Reis and S. D. Gribble. Isolating web programs in modern browser architectures. In Proc. of Eurosys, 2009.
-
(2009)
Proc. of Eurosys
-
-
Reis, C.1
Gribble, S. D.2
-
34
-
-
84887309913
-
Cross-site scripting prevention with dynamic data tainting and static analysis
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross-site scripting prevention with dynamic data tainting and static analysis. In Proc. of NDSS, 2007.
-
(2007)
Proc. of NDSS
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
35
-
-
77954608267
-
The multi-principal os construction of the gazelle web browser
-
H. J. Wang, C. Grier, A. Moshchuk, S. T. King, P. Choudhury, and H. Venter. The multi-principal os construction of the gazelle web browser. In Usenix Security, 2009.
-
(2009)
Usenix Security
-
-
Wang, H. J.1
Grier, C.2
Moshchuk, A.3
King, S. T.4
Choudhury, P.5
Venter, H.6
-
36
-
-
84904088330
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
Y.-M. Wang, D. Beck, X. Jiang, and R. Roussev. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In Proc. of NDSS, 2006.
-
(2006)
Proc. of NDSS
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
|