Knittel et al., 2021 - Google Patents
Xsinator. com: From a formal model to the automatic evaluation of cross-site leaks in web browsersKnittel et al., 2021
View PDF- Document ID
- 16763973379484057822
- Author
- Knittel L
- Mainka C
- Niemietz M
- Noß D
- Schwenk J
- Publication year
- Publication venue
- Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
External Links
Snippet
Cross-Site Leaks (XS-Leaks) describe a client-side bug that allows an attacker to collect side-channel information from a cross-origin HTTP resource. They are a significant threat to Internet privacy since simply visiting a web page may reveal if the victim is a drug addict or …
- 238000011156 evaluation 0 title description 25
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sanchez-Rola et al. | Extension breakdown: Security analysis of browsers extension resources control policies | |
Bianchi et al. | What the app is that? deception and countermeasures in the android user interface | |
Stuttard et al. | The web application hacker's handbook: Finding and exploiting security flaws | |
Andrews et al. | How to break web software: Functional and security testing of web applications and web services | |
Lekies et al. | The Unexpected Dangers of Dynamic {JavaScript} | |
Stock et al. | Protecting users against XSS-based password manager abuse | |
Knittel et al. | Xsinator. com: From a formal model to the automatic evaluation of cross-site leaks in web browsers | |
Eriksson et al. | Hardening the security analysis of browser extensions | |
Blankstein et al. | Automating isolation and least privilege in web services | |
Tao et al. | Opening a Pandora's box: things you should know in the era of custom GPTs | |
Kim et al. | Extending a hand to attackers: browser privilege escalation attacks via extensions | |
Shahriar et al. | Proclick: a framework for testing clickjacking attacks in web applications | |
Toreini et al. | DOMtegrity: ensuring web page integrity against malicious browser extensions | |
Bui et al. | Xss vulnerabilities in cloud-application add-ons | |
Gupta et al. | Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions | |
Onarlioglu et al. | Sentinel: Securing legacy firefox extensions | |
Musch et al. | Server-side browsers: exploring the web's hidden attack surface | |
Sentana et al. | An empirical analysis of security and privacy risks in android cryptocurrency wallet apps | |
Sierra et al. | Defending your android app | |
Saini et al. | Colluding browser extension attack on user privacy and its implication for web browsers | |
Saini et al. | The darker side of firefox extension | |
Agarwal et al. | First, Do No Harm: Studying the manipulation of security headers in browser extensions | |
Moreno et al. | Chrowned by an extension: abusing the Chrome DevTools protocol through the debugger API | |
Golubovic | Attacking browser extensions | |
Narvekar et al. | Security sandbox model for modern web environment |