Browser Security: Lessons from Google Chrome
نویسندگان
چکیده
منابع مشابه
An Evaluation of the Google Chrome Extension Security Architecture
Vulnerabilities in browser extensions put users at risk by providing a way for website and network attackers to gain access to users’ private data and credentials. Extensions can also introduce vulnerabilities into the websites that they modify. In 2009, Google Chrome introduced a new extension platform with several features intended to prevent and mitigate extension vulnerabilities: strong iso...
متن کاملWikipedia Verification Check: A Chrome Browser Extension
In this paper we present Version 1.0 of an implementation of a Wiki reference parser with a light-weight plugin in the form of a Google Chrome [Google 2017] Extension with Javascript. The output of the parser is a “verification score” for any Wikipedia page, constructed from a combination of scores derived from reference accessibility and quality. The extension presented herein works from a pre...
متن کاملBrowser security
The past decade has shown that the browser is a vulnerable application. Vulnerabilities are still frequently being discovered for all browsers. Besides this, a typical browser has more than one plug-in installed and through the vulnerabilities associated with plug-ins fully patched browsers are at risk. Even if a browser and its plug-ins are patched and no vulnerabilities are known, the browser...
متن کاملFilterPlus: A real-time content filtering extension for Google Chrome
Content filtering in web browsers is a tedious process for most of the people, because of several reasons. By blocking JavaScript, Cookies and Popups, end users can ensure maximum protection from browser based attacks and vulnerabilities. In order to accomplish this, we built an extension for Google Chrome which allows users to have easy control over what they wish to recievce froma web page. W...
متن کاملToward Principled Browser Security
To ensure the confidentiality and integrity of web content, modern web browsers enforce isolation between content and scripts from different domains with the same-origin policy (SOP). However, many web applications require cross-origin sharing of code and data. This conflict between isolation and sharing has led to an ad hoc implementation of the SOP that has proven vulnerable to such attacks a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Queue
سال: 2009
ISSN: 1542-7730,1542-7749
DOI: 10.1145/1551644.1556050