Kimak, 2016 - Google Patents
An investigation into possible attacks on HTML5 indexedDB and their preventionKimak, 2016
View PDF- Document ID
- 10389670294711126639
- Author
- Kimak S
- Publication year
- Publication venue
- PQDT-UK & Ireland
External Links
Snippet
This thesis presents an analysis of, and enhanced security model for IndexedDB, the persistent HTML5 browser-based data store. In versions of HTML prior to HTML5, web sites used cookies to track user preferences locally. Cookies are however limited both in file size …
- 238000009114 investigational therapy 0 title description 46
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/3089—Web site content organization and management, e.g. publishing, automatic linking or maintaining pages
- G06F17/30893—Access to data in other repository systems, e.g. legacy data or dynamic Web page generation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30899—Browsing optimisation
- G06F17/30905—Optimising the visualization of content, e.g. distillation of HTML documents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30873—Retrieval from the Internet, e.g. browsers by navigation, e.g. using categorized browsing, portals, synchronized browsing, visual networks of documents, virtual worlds or tours
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30899—Browsing optimisation
- G06F17/30902—Browsing optimisation of access to content, e.g. by caching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30876—Retrieval from the Internet, e.g. browsers by using information identifiers, e.g. encoding URL in specific indicia, browsing history
- G06F17/30884—Bookmark management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
- G06F17/2247—Tree structured documents; Markup, e.g. Standard Generalized Markup Language [SGML], Document Type Definition [DTD]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2216/00—Indexing scheme relating to additional aspects of information retrieval not explicitly covered by G06F17/30 and subgroups
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Senol et al. | Leaky forms: A study of email and password exfiltration before form submission | |
US9582668B2 (en) | Quantifying the risks of applications for mobile devices | |
US10205742B2 (en) | Stateless web content anti-automation | |
US9609006B2 (en) | Detecting the introduction of alien content | |
Sadqi et al. | A systematic review and taxonomy of web applications threats | |
Stock et al. | Protecting users against XSS-based password manager abuse | |
Pan et al. | I do not know what you visited last summer: Protecting users from third-party web tracking with trackingfree browser | |
Meetei et al. | Security issues in cloud computing | |
Muscat | Web vulnerabilities: identifying patterns and remedies | |
Van Acker et al. | Password meters and generators on the web: From large-scale empirical study to getting it right | |
Ferrari et al. | Nosql breakdown: A large-scale analysis of misconfigured nosql services | |
Kimak | An investigation into possible attacks on HTML5 indexedDB and their prevention | |
Sharif | Web attacks analysis and mitigation techniques | |
Zhao et al. | SafeSky: a secure cloud storage middleware for end-user applications | |
Mehak et al. | Security aspects of database-as-a-service (DBaaS) in cloud computing | |
Dong et al. | Exploring covert third-party identifiers through external storage in the Android new era | |
Lakhe | Practical Hadoop Security | |
Oz et al. | Ransomware over modern Web browsers: a novel strain and a new defense mechanism | |
Kothawade et al. | Cloud Security: Penetration Testing of Application in Micro-service architecture and Vulnerability Assessment. | |
Al-Rousan | An Investigation of User Privacy and Data Protection on User-Side Storage | |
Al-Rousan et al. | A New Security Model for Web Browser Local Storage | |
Wang et al. | What WeChat Knows: Pervasive First-Party Tracking in a Billion-User Super-App Ecosystem | |
Quinton | Safety of web applications: risks, encryption and handling vulnerabilities with PHP | |
Li | On Enhancing Security of Password-Based Authentication | |
Perez | Analysis and detection of the silent thieves |