A Framework for Smart Trusted Indicators for Browsers (STIB)
نویسندگان
چکیده
Web browsers currently have security indicators which provide security features that notify users of malicious or un-trusted websites. Most of these security indicators are normally synced with some black list data base that has a list with known websites that are known to be malicious. When a user surfs a website that is identified in the black list data base, the security indicators then notify the user with a warning indicating that the current site has been identified as a malicious or un-trusted site and give the user the option to continue or exit the current site. Due to the fact that these black list data base may not possibly contain every malicious site, users may come across a website that they feel that may be a an un-trusted site but have not received a warning message from the security indicator indicating otherwise. In this paper, we propose an extension security indicator called Smart Trusted indicators for Browsers, STIB, which will perform an extensive web activities history check on the current site determining how often that website is viewed or transacted to provide the user with more information about the site and the confidentiality of the legitimacy of the site.
منابع مشابه
Liquid Stream Processing Across Web Browsers and Web Servers
The recently proposed API definition WebRTC introduced peer-to-peer real time communication between Web browsers, allowing streaming systems to be deployed on browsers in addition to traditional server-side execution environments. While streaming applications can be adapted to run on Web browsers, it remains difficult to deal with temporary disconnections, energy consumption on mobile devices a...
متن کاملSecure Application Execution in Mobile Devices
Smart phones have rapidly become hand-held mobile devices capable of sustaining multiple applications. Some of these applications allow access to services including healthcare, financial and online social networks and are becoming common in the smart phone environment. From a security and privacy point of view, this seismic shift is creating new challenges, as the smart phone environment is bec...
متن کاملTrust and Protection in the Illinois Browser Operating System
Current web browsers are complex, have enormous trusted computing bases, and provide attackers with easy access to modern computer systems. In this paper we introduce the Illinois Browser Operating System (IBOS), a new operating system and a new browser that reduces the trusted computing base for web browsers. In our architecture we expose browser-level abstractions at the lowest software layer...
متن کاملTool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts
Blockchain-based distributed computing platforms enable the trusted execution of computation—defined in the form of smart contracts—without trusted agents. Smart contracts are envisioned to have a variety of applications, ranging from financial to IoT asset tracking. Unfortunately, the development of smart contracts has proven to be extremely error prone. In practice, contracts are riddled with...
متن کاملSecuring Multi-Application Smart Cards by Security-by-Contract
The Security-by-Contract (S×C) framework has recently been proposed to support applications evolution in multi-application smart cards. The key idea is based on the notion of contract, a specification of the security behavior of an application that must be compliant with the security policy of a smart card. In this paper we address one of the key features needed to apply the S×C idea to a resou...
متن کامل