메뉴 건너뛰기




Volumn , Issue , 2010, Pages 339-354

VEX: Vetting browser extensions for security vulnerabilities

Author keywords

[No Author keywords available]

Indexed keywords

STATIC ANALYSIS;

EID: 85076320754     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (91)

References (36)
  • 2
    • 35048839749 scopus 로고    scopus 로고
    • Information flow analysis in logical form
    • R. Giacobazzi, editor, Springer-Verlag
    • T. Amtoft and A. Banerjee. Information flow analysis in logical form. In R. Giacobazzi, editor, SAS 2004, volume 3148 of LNCS, pages 100–115. Springer-Verlag, 2004.
    • (2004) SAS 2004, Volume 3148 of LNCS , pp. 100-115
    • Amtoft, T.1    Banerjee, A.2
  • 7
    • 67650844248 scopus 로고    scopus 로고
    • Staged information flow for JavaScript
    • M. Hind and A. Diwan, editors, ACM
    • R. Chugh, J. A. Meister, R. Jhala, and S. Lerner. Staged information flow for JavaScript. In M. Hind and A. Diwan, editors, PLDI, pages 50–62. ACM, 2009.
    • (2009) PLDI , pp. 50-62
    • Chugh, R.1    Meister, J.A.2    Jhala, R.3    Lerner, S.4
  • 11
    • 78651539599 scopus 로고    scopus 로고
    • XFI: Software guards for system address spaces
    • USENIX Association
    • Ú. Erlingsson, M. Abadi, M. Vrable, M. Budiu, and G. C. Necula. XFI: Software guards for system address spaces. In OSDI, pages 75–88. USENIX Association, 2006.
    • (2006) OSDI , pp. 75-88
    • Erlingsson, Ú.1    Abadi, M.2    Vrable, M.3    Budiu, M.4    Necula, G.C.5
  • 17
    • 84890883068 scopus 로고    scopus 로고
    • Gatekeeper: Mostly static enforcement of security and reliability policies for JavaScript code
    • S. Guarnieri and B. Livshits. Gatekeeper: Mostly static enforcement of security and reliability policies for JavaScript code. In Proceedings of USENIX Security’09, pages 151–168, 2009.
    • (2009) Proceedings of USENIX Security’09 , pp. 151-168
    • Guarnieri, S.1    Livshits, B.2
  • 19
    • 19944365247 scopus 로고    scopus 로고
    • Securing web application code by static analysis and runtime protection
    • New York, NY, USA, ACM
    • Y.-W. Huang, F. Yu, C. Hang, C.-H. Tsai, D.-T. Lee, and S.-Y. Kuo. Securing web application code by static analysis and runtime protection. In WWW, pages 40–52, New York, NY, USA, 2004. ACM.
    • (2004) WWW , pp. 40-52
    • Huang, Y.-W.1    Yu, F.2    Hang, C.3    Tsai, C.-H.4    Lee, D.-T.5    Kuo, S.-Y.6
  • 22
    • 58549099340 scopus 로고    scopus 로고
    • JavaScript instrumentation in practice
    • Berlin, Heidelberg, Springer-Verlag
    • H. Kikuchi, D. Yu, A. Chander, H. Inamura, and I. Serikov. JavaScript instrumentation in practice. In APLAS’08, pages 326–341, Berlin, Heidelberg, 2008. Springer-Verlag.
    • (2008) APLAS’08 , pp. 326-341
    • Kikuchi, H.1    Yu, D.2    Chander, A.3    Inamura, H.4    Serikov, I.5
  • 26
    • 14944340027 scopus 로고    scopus 로고
    • Identifying cross site scripting vulnerabilities in web applications
    • Washington, DC, USA, IEEE Computer Society
    • G. A. D. Lucca, A. R. Fasolino, M. Mastoianni, and P. Tramontana. Identifying cross site scripting vulnerabilities in web applications. In WSE’04, pages 71–80, Washington, DC, USA, 2004. IEEE Computer Society.
    • (2004) WSE’04 , pp. 71-80
    • Lucca, G.A.D.1    Fasolino, A.R.2    Mastoianni, M.3    Tramontana, P.4
  • 28
    • 70350525212 scopus 로고    scopus 로고
    • Language-based isolation of untrusted Javascript
    • IEEE, also: Dep. of Computing, Imperial College London, Technical Report DTR09-3, 2009
    • S. Maffeis and A. Taly. Language-based isolation of untrusted Javascript. In Proc. of CSF’09, IEEE, 2009. See also: Dep. of Computing, Imperial College London, Technical Report DTR09-3, 2009.
    • (2009) Proc. Of CSF’09
    • Maffeis, S.1    Taly, A.2
  • 31
    • 85084100576 scopus 로고    scopus 로고
    • Dealing with disaster: Surviving misbehaved kernel extensions
    • M. I. Seltzer, Y. Endo, C. Small, and K. A. Smith. Dealing with disaster: Surviving misbehaved kernel extensions. In OSDI, pages 213–227, 1996.
    • (1996) OSDI , pp. 213-227
    • Seltzer, M.I.1    Endo, Y.2    Small, C.3    Smith, K.A.4
  • 32
    • 84887309913 scopus 로고    scopus 로고
    • Cross site scripting prevention with dynamic data tainting and static analysis
    • The Internet Society
    • P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Krügel, and G. Vigna. Cross site scripting prevention with dynamic data tainting and static analysis. In NDSS. The Internet Society, 2007.
    • (2007) NDSS
    • Vogt, P.1    Nentwich, F.2    Jovanovic, N.3    Kirda, E.4    Krügel, C.5    Vigna, G.6
  • 35
    • 33846497980 scopus 로고    scopus 로고
    • Javascript instrumentation for browser security
    • M. Hofmann and M. Felleisen, editors, ACM
    • D. Yu, A. Chander, N. Islam, and I. Serikov. Javascript instrumentation for browser security. In M. Hofmann and M. Felleisen, editors, POPL, pages 237–249. ACM, 2007.
    • (2007) POPL , pp. 237-249
    • Yu, D.1    Chander, A.2    Islam, N.3    Serikov, I.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.