[go: up one dir, main page]

Knittel et al., 2021 - Google Patents

Xsinator. com: From a formal model to the automatic evaluation of cross-site leaks in web browsers

Knittel et al., 2021

View PDF
Document ID
16763973379484057822
Author
Knittel L
Mainka C
Niemietz M
Noß D
Schwenk J
Publication year
Publication venue
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security

External Links

Snippet

Cross-Site Leaks (XS-Leaks) describe a client-side bug that allows an attacker to collect side-channel information from a cross-origin HTTP resource. They are a significant threat to Internet privacy since simply visiting a web page may reveal if the victim is a drug addict or …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
Sanchez-Rola et al. Extension breakdown: Security analysis of browsers extension resources control policies
Bianchi et al. What the app is that? deception and countermeasures in the android user interface
Stuttard et al. The web application hacker's handbook: Finding and exploiting security flaws
Andrews et al. How to break web software: Functional and security testing of web applications and web services
Lekies et al. The Unexpected Dangers of Dynamic {JavaScript}
Stock et al. Protecting users against XSS-based password manager abuse
Knittel et al. Xsinator. com: From a formal model to the automatic evaluation of cross-site leaks in web browsers
Eriksson et al. Hardening the security analysis of browser extensions
Blankstein et al. Automating isolation and least privilege in web services
Tao et al. Opening a Pandora's box: things you should know in the era of custom GPTs
Kim et al. Extending a hand to attackers: browser privilege escalation attacks via extensions
Shahriar et al. Proclick: a framework for testing clickjacking attacks in web applications
Toreini et al. DOMtegrity: ensuring web page integrity against malicious browser extensions
Bui et al. Xss vulnerabilities in cloud-application add-ons
Gupta et al. Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions
Onarlioglu et al. Sentinel: Securing legacy firefox extensions
Musch et al. Server-side browsers: exploring the web's hidden attack surface
Sentana et al. An empirical analysis of security and privacy risks in android cryptocurrency wallet apps
Sierra et al. Defending your android app
Saini et al. Colluding browser extension attack on user privacy and its implication for web browsers
Saini et al. The darker side of firefox extension
Agarwal et al. First, Do No Harm: Studying the manipulation of security headers in browser extensions
Moreno et al. Chrowned by an extension: abusing the Chrome DevTools protocol through the debugger API
Golubovic Attacking browser extensions
Narvekar et al. Security sandbox model for modern web environment