-
1
-
-
85076300715
-
-
Adblock. http://en.wikipedia.org/wiki/Adblock.
-
-
-
-
4
-
-
84873471297
-
-
Greasemonkey. http://en.wikipedia.org/wiki/Greasemonkey.
-
Greasemonkey
-
-
-
5
-
-
70350435024
-
-
Return-to-libc attack. http://en.wikipedia.org/wiki/ Return-to-libc_attack.
-
Return-to-Libc Attack
-
-
-
8
-
-
85076300257
-
-
May
-
XPConnect wrappers, May 2010. https://developer.mozilla.org/en/ XPConnect_wrappers.
-
(2010)
XPConnect Wrappers
-
-
-
9
-
-
50249115131
-
Saner: Composing static and dynamic analysis to validate sanitization in web applications
-
D. Balzarotti, M. Cova, V. Felmetsger, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Saner: Composing static and dynamic analysis to validate sanitization in web applications. In Proceedings of the IEEE Symposium on Security and Privacy, pages 387–401, 2008.
-
(2008)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 387-401
-
-
Balzarotti, D.1
Cova, M.2
Felmetsger, V.3
Jovanovic, N.4
Kirda, E.5
Kruegel, C.6
Vigna, G.7
-
11
-
-
84910677088
-
Cross-origin JavaScript capability leaks: Detection, exploitation, and defense
-
Aug
-
A. Barth, J. Weinberger, and D. Song. Cross-origin JavaScript capability leaks: Detection, exploitation, and defense. In Proceedings of the USENIX Security Symposium, Aug. 2009.
-
(2009)
Proceedings of the USENIX Security Symposium
-
-
Barth, A.1
Weinberger, J.2
Song, D.3
-
14
-
-
85076904874
-
Leveraging legacy code to deploy desktop applications on the web
-
J. R. Douceur, J. Elson, J. Howell, and J. R. Lorch. Leveraging legacy code to deploy desktop applications on the web. In Proceedings of the Operating Systems Design and Implementation (OSDI), pages 339–354, 2008.
-
(2008)
Proceedings of the Operating Systems Design and Implementation (OSDI)
, pp. 339-354
-
-
Douceur, J.R.1
Elson, J.2
Howell, J.3
Lorch, J.R.4
-
15
-
-
48349087157
-
Enhancing web browser security against malware extensions
-
Aug
-
M. T. Louw, J. S. Lim, and V. N. Venkatakrishnan. Enhancing web browser security against malware extensions. Journal in Computer Virology, 4(3):179–195, Aug. 2008.
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.3
, pp. 179-195
-
-
Louw, M.T.1
Lim, J.S.2
Venkatakrishnan, V.N.3
-
16
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
Feb
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of the Network and Distributed System Security Symposium, Feb. 2005.
-
(2005)
Proceedings of the Network and Distributed System Security Symposium
-
-
Newsome, J.1
Song, D.2
-
18
-
-
74049152095
-
Pointless tainting? Evaluating the practicality of pointer tainting
-
Apr
-
A. Slowinska and H. Bos. Pointless Tainting? Evaluating the Practicality of Pointer Tainting. In Proceedings of the EuroSys conference, Apr. 2009.
-
(2009)
Proceedings of the EuroSys Conference
-
-
Slowinska, A.1
Bos, H.2
-
19
-
-
84887309913
-
Cross-site scripting prevention with dynamic data tainting and static analysis
-
P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross-site scripting prevention with dynamic data tainting and static analysis. In Proceedings of the Network and Distributed System Security Symposium, 2007.
-
(2007)
Proceedings of the Network and Distributed System Security Symposium
-
-
Vogt, P.1
Nentwich, F.2
Jovanovic, N.3
Kirda, E.4
Kruegel, C.5
Vigna, G.6
-
20
-
-
0031542975
-
Extensible security architectures for Java
-
D. S. Wallach, D. Balfanz, D. Dean, and E. W. Felten. Extensible security architectures for Java. In Proceedings of the Symposium on Operating Systems Principles (SOSP), pages 116–128, 1997.
-
(1997)
Proceedings of the Symposium on Operating Systems Principles (SOSP)
, pp. 116-128
-
-
Wallach, D.S.1
Balfanz, D.2
Dean, D.3
Felten, E.W.4
-
21
-
-
41149109640
-
Protection and communication abstractions for web browsers in MashupOS
-
H. J. Wang, X. Fan, J. Howell, and C. Jackson. Protection and communication abstractions for web browsers in MashupOS. In Proceedings of the Symposium on Operating Systems Principles (SOSP), pages 1–16, 2007.
-
(2007)
Proceedings of the Symposium on Operating Systems Principles (SOSP)
, pp. 1-16
-
-
Wang, H.J.1
Fan, X.2
Howell, J.3
Jackson, C.4
-
22
-
-
77954608267
-
The multi-principal OS construction of the Gazelle web browser
-
H. J. Wang, C. Grier, A. Moshchuk, S. T. King, P. Choudhury, and H. Venter. The multi-principal OS construction of the Gazelle web browser. In Proceedings of the USENIX Security Symposium, 2009.
-
(2009)
Proceedings of the USENIX Security Symposium
-
-
Wang, H.J.1
Grier, C.2
Moshchuk, A.3
King, S.T.4
Choudhury, P.5
Venter, H.6
-
23
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
B. Yee, D. Sehr, G. Dardyk, J. B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar. Native client: A sandbox for portable, untrusted x86 native code. In Proceedings of the IEEE Symposium on Security and Privacy, pages 79–93, 2009.
-
(2009)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 79-93
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, J.B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
|