منابع مشابه
Web Browsers and Security
Today the World Wide Web is considered to be a platform for building distributed applications. This evolution is made possible by browsers with processing capabilities and by programming languages that allow web designers to embed real programs into HTML documents. Downloading and executing code from anywhere on the Internet brings security problems along with it. A systematic and thorough anal...
متن کاملJava Security: Web Browsers and Beyond
The introduction of Java applets has taken the World Wide Web by storm. Java allows web creators to embellish their content with arbitrary programs which execute in the web browser, whether for simple animations or complex front-ends to other services. We examined the Java language and the Sun HotJava, Netscape Navigator, and Microsoft Internet Explorer browsers which support it, and found a si...
متن کاملPrivacy and Security Issues in BAT Web Browsers
In this position paper, we summarize our technical analysis of the security and privacy vulnerabilities in three web browsers developed by China’s three biggest web companies: UC Browser, QQ Browser and Baidu Browser; developed by UCWeb (owned by Alibaba), Tencent and Baidu, respectively. We found them to consistently contain sensitive data leaks and remote code execution vulnerabilities in the...
متن کاملBenchmarking Modern Web Browsers
Many different Web browsers are available on the Internet, free of charge. A browser performs several tasks, such as rendering Web pages on the screen and executing client-side code often embedded in Web pages. Users typically choose a browser that gives them a satisfying browsing experience, which is partly determined by the speed of the browser. This paper presents benchmark performance test ...
متن کاملImproving the Security and Robustness of Modern Web Browsers
Despite their popularity, modern web browsers do not offer a secure or robust environment for interacting with untrusted content. Today’s web users face a variety of threats, including exploits of browser vulnerabilities, interference between web sites, script injection attacks, and abuse of authentication credentials. To address these threats, I leverage an analogy between operating systems an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Online and Biomedical Engineering (iJOE)
سال: 2013
ISSN: 2626-8493
DOI: 10.3991/ijoe.v9i3.2468