van Dongen, 2009 - Google Patents
Browser securityvan Dongen, 2009
View PDF- Document ID
- 2806862508139175805
- Author
- van Dongen W
- Publication year
External Links
Snippet
The past decade has shown that the browser is a vulnerable application. Vulnerabilities are still frequently being discovered for all browsers. Besides this, a typical browser has more than one plug-in installed and through the vulnerabilities associated with plug-ins fully …
- 238000000034 method 0 description 17
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12413624B2 (en) | Cyber secure communications system | |
US8225404B2 (en) | Trusted secure desktop | |
Lu et al. | Blade: an attack-agnostic approach for preventing drive-by malware infections | |
US8918865B2 (en) | System and method for protecting data accessed through a network connection | |
US8973136B2 (en) | System and method for protecting computer systems from malware attacks | |
US20100186089A1 (en) | Method and system for protecting cross-domain interaction of a web application on an unmodified browser | |
US11586726B2 (en) | Secure web framework | |
Shalini et al. | Prevention of cross-site scripting attacks (xss) on web applications in the client side | |
WO2013079113A1 (en) | Secure cloud browsing client-server system and method of secure remote browsing using the same | |
Alsmadi et al. | Practical information security | |
Satish et al. | Web browser security: different attacks detection and prevention techniques | |
Onarlioglu et al. | Sentinel: Securing legacy firefox extensions | |
Aldoseri et al. | insecure:: Vulnerability analysis of URI scheme handling in Android mobile browsers | |
Girma et al. | Identifying Shared Security Vulnerabilities and Mitigation Strategies at the Intersection of Application Programming Interfaces (APIs), Application-Level and Operating System (OS) of Mobile Devices | |
Jansen et al. | Guidelines on active content and mobile code | |
Narvekar et al. | Security sandbox model for modern web environment | |
Pope | Systemic Theoretic Process Analysis (STPA) used for cyber security and agile software development | |
van Dongen | Browser security | |
Serrhini et al. | Improve security of web Browser with stand-alone e-Learning awareness application | |
Wurster | Security mechanisms and policy for mandatory access control in computer systems | |
Reis | Web browsers as operating systems: supporting robust and secure web programs | |
Sengupta et al. | An Analysis of Security Features on Web Browsers | |
Serrhini et al. | Home Users Security and the Web Browser Inbuilt Settings, Framework to setup IT Automatically. | |
Jha | Key Cybersecurity Frameworks | |
Burns | Towards Unhackable Computing: An Examination of Modern Threats and Defenses |