Academic literature on the topic 'Browser extensions'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Browser extensions.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Browser extensions"
Picazo-Sanchez, Pablo, Juan Tapiador, and Gerardo Schneider. "After you, please: browser extensions order attacks and countermeasures." International Journal of Information Security 19, no. 6 (November 21, 2019): 623–38. http://dx.doi.org/10.1007/s10207-019-00481-8.
Full textWang, Yao, Wandong Cai, Pin Lyu, and Wei Shao. "A Combined Static and Dynamic Analysis Approach to Detect Malicious Browser Extensions." Security and Communication Networks 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/7087239.
Full textFerguson, Christine L. "Leaning into Browser Extensions." Serials Review 45, no. 1-2 (April 3, 2019): 48–53. http://dx.doi.org/10.1080/00987913.2019.1624909.
Full textKruegel, Christopher. "Making browser extensions secure." Communications of the ACM 54, no. 9 (September 2011): 90. http://dx.doi.org/10.1145/1995376.1995397.
Full textDe Sarkar, Tanmay. "The prevalence of web browser extensions use in library services: an exploratory study." Electronic Library 33, no. 3 (June 1, 2015): 334–54. http://dx.doi.org/10.1108/el-04-2013-0063.
Full textPerrotta, Raffaello, and Feng Hao. "Botnet in the Browser: Understanding Threats Caused by Malicious Browser Extensions." IEEE Security & Privacy 16, no. 4 (July 2018): 66–81. http://dx.doi.org/10.1109/msp.2018.3111249.
Full textTer Louw, Mike, Jin Soon Lim, and V. N. Venkatakrishnan. "Enhancing web browser security against malware extensions." Journal in Computer Virology 4, no. 3 (January 12, 2008): 179–95. http://dx.doi.org/10.1007/s11416-007-0078-5.
Full textPatil, Kailas. "Isolating malicious content scripts of browser extensions." International Journal of Information Privacy, Security and Integrity 3, no. 1 (2017): 18. http://dx.doi.org/10.1504/ijipsi.2017.086794.
Full textPatil, Kailas. "Isolating malicious content scripts of browser extensions." International Journal of Information Privacy, Security and Integrity 3, no. 1 (2017): 18. http://dx.doi.org/10.1504/ijipsi.2017.10007834.
Full textAgarwal, S., and H. Yu. "Figure summarizer browser extensions for PubMed Central." Bioinformatics 27, no. 12 (April 14, 2011): 1723–24. http://dx.doi.org/10.1093/bioinformatics/btr194.
Full textDissertations / Theses on the topic "Browser extensions"
Nicholson, Brian Robert. "LibX 2.0." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/36355.
Full textMaster of Science
Bertmar, Sofia, and Johanna Gerhardsen. "Profile based evaluation of what different browsers and browser extensions may be able to learn about a user." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177163.
Full textJoelsson, Tomas. "Mobile Web Browser Extensions : Utilizing local device functionality in mobile web applications." Thesis, KTH, Kommunikationssystem, CoS, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91862.
Full textI dagens mobila webbläsare återfinns det mesta av funktionaliteten från webbläsare för datorer. Det som dock fortfarande saknas är möjligheten för webbapplikationer att komma åt lokala telefonfunktioner. Dagens mobiltelefoner är ofta utrustade med GPS-mottagare och digitalkameror, men dessa kan för närvarande ej nås från webbläsaren. Det enda sättet att utnyttja dessa inbyggda funktioner är genom separata applikationer, men sådana applikationer är inte lika mångsidiga som webbläsare. Om en mobil webbläsare kunde utnyttja de inbyggda funktionerna, så skulle en mobil applikation kunna köras i webbläsaren istället för att ha separat klientprogramvara. Det här examensarbetet föreslår ett sätt att ge denna möjlighet till mobila webbläsare. I den föreslagna metoden används en lokal Java-applikation för att ge tillgång till inbyggda funktioner via skript. Denna applikation fungerar som en proxy-server och låter webbläsaren anropa metoder exponerade av lokala Java-API. Både fördelar och några säkerhetsproblem med den här lösningen undersöks. Fördelarna visas ytterligare genom två exempel på webbapplikationer som utnyttjar inbyggda telefonfunktioner.
Najbr, Ondřej. "Nástroj pro komentování obsahu webu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220543.
Full textJarosch, Dennis. "Effects and opportunities of native code extensions for computationally demanding web applications." Doctoral thesis, Humboldt-Universität zu Berlin, Philosophische Fakultät I, 2012. http://dx.doi.org/10.18452/16451.
Full textThe World Wide Web is amidst a transition from interactive websites to web applications. An increasing number of users perform their daily computing tasks entirely within the web browser, turning the Web into an important platform for application development. The Web as a platform, however, lacks the computational performance of native applications. This problem has motivated the inception of Microsoft Xax and Google Native Client (NaCl), two independent projects that facilitate the development of native web applications. These allow the extension of conventional web applications with compiled native code, while maintaining operating system portability. This dissertation determines the benefits and drawbacks of native web applications. It also examines the actual performance capabilities of JavaScript web applications. An experimental performance analysis is undertaken in order to determine and compare the performance characteristics of native C applications, JavaScript web applications, and NaCl native web applications. Four application benchmarks consider different performance aspects: number crunching (serial and parallel), 3D graphics performance, and data processing. The results confirm that NaCl''s performance in computational tasks and 3D graphics is impeccable. On the other hand, it shows substantial limitations in data processing. These are evaluated and possible solutions are discussed. The results of the performance analysis are complemented with an evaluation on the basis of technical and non-technical criteria and a discussion of the technical, political, and strategic drivers for NaCl.
Lindahl, Daniel. "Ledsagande av seniorer i samband med webben : Identifiering av tillvägagångssätt att bistå seniorer i utförandet av uppgifter på webben." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-85937.
Full textThe web can be used in multiple purposes and can create a value both at work and in the personal life of people. Today computers, internet and IT in general are commonly used in multiple professions. IT has also become a part of the Swedish educational system where it happens that the schools provides the students with a computer with including programs to conduct their studies. Most swedes today gets some kind of computer habit from either work or education, something that certain seniors have missed out on. People above the age of 75 is by margin the age-group (taking in to account twelve years and older) that most seldom uses internet in Sweden. When asked why a common answer is “it is too hard”. This study aims to find out in what ways the use of the web can be made easier for seniors (in this study defined as 75 years of age and older). For starters the study focused on finding out what seniors can get out of using internet and the web. That was done by literature searching and a number of interviews. It showed that seniors who actually uses the web one way or the other uses for example internet banking, mail and news by computer, smartphone and/or tablet. These three areas (internet banking, mail and news) was used as a Centre in the user tests who was conducted in order to find out how seniors can be assisted in their interaction with the web. A browser extension was formed suited to the three areas mentioned above. Browser extensions is a sort of a local program/extension to install in your browser to personally have access to external functionality, such as blocking advertisement. The browser extension formed in this study gave the users browser graphic elements with the purpose to help the user solve a number of predetermined tasks. Three concepts was tested in the study. In the context of this study a concept is the way that the graphic assist is formed. User tests was conducted with and without the browser extension as an assist in order to see if there was a difference in the results. When tests was conducted with the browser extension the concepts was rotated so that all three concepts was tested on equal basis. The test persons who conducted the tests with the browser extension also got the opportunity to give anonymous feedback on the concepts through an inquiry that was filled out after conducted test. The result of the user tests and the inquiry indicates that seniors would appreciate a step by step guide for tasks on the web. According to the results of this study seniors conducts everyday tasks both quicker and with more success when there is a step by step list or highlighted headlines and buttons describing said task.
Marek, Lukáš. "Analýza a vylepšování aplikací pro prohlížeče na základě trendů užívání." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-198294.
Full textSomé, Dolière Francis. "Sécurité et vie privée dans les applications web." Thesis, Université Côte d'Azur (ComUE), 2018. http://www.theses.fr/2018AZUR4085/document.
Full textIn this thesis, we studied security and privacy threats in web applications and browser extensions. There are many attacks targeting the web of which XSS (Cross-Site Scripting) is one of the most notorious. Third party tracking is the ability of an attacker to benefit from its presence in many web applications in order to track the user has she browses the web, and build her browsing profile. Extensions are third party software that users install to extend their browser functionality and improve their browsing experience. Malicious or poorly programmed extensions can be exploited by attackers in web applications, in order to benefit from extensions privileged capabilities and access sensitive user information. Content Security Policy (CSP) is a security mechanism for mitigating the impact of content injection attacks in general and in particular XSS. The Same Origin Policy (SOP) is a security mechanism implemented by browsers to isolate web applications of different origins from one another. In a first work on CSP, we analyzed the interplay of CSP with SOP and demonstrated that the latter allows the former to be bypassed. Then we scrutinized the three CSP versions and found that a CSP is differently interpreted depending on the browser, the version of CSP it implements, and how compliant the implementation is with respect to the specification. To help developers deploy effective policies that encompass all these differences in CSP versions and browsers implementations, we proposed the deployment of dependency-free policies that effectively protect against attacks in all browsers. Finally, previous studies have identified many limitations of CSP. We reviewed the different solutions proposed in the wild, and showed that they do not fully mitigate the identified shortcomings of CSP. Therefore, we proposed to extend the CSP specification, and showed the feasibility of our proposals with an example of implementation. Regarding third party tracking, we introduced and implemented a tracking preserving architecture, that can be deployed by web developers willing to include third party content in their applications while preventing tracking. Intuitively, third party requests are automatically routed to a trusted middle party server which removes tracking information from the requests. Finally considering browser extensions, we first showed that the extensions that users install and the websites they are logged into, can serve to uniquely identify and track them. We then studied the communications between browser extensions and web applications and demonstrate that malicious or poorly programmed extensions can be exploited by web applications to benefit from extensions privileged capabilities. Also, we demonstrated that extensions can disable the Same Origin Policy by tampering with CORS headers. All this enables web applications to read sensitive user information. To mitigate these threats, we proposed countermeasures and a more fine-grained permissions system and review process for browser extensions. We believe that this can help browser vendors identify malicious extensions and warn users about the threats posed by extensions they install
Ferranti, Mirko. "Polymorph per realizzare estensioni di browser multi-piattaforma." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/23403/.
Full textVondráček, Tomáš. "Získávání informací o uživatelích na webových stránkách." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445554.
Full textBook chapters on the topic "Browser extensions"
Wootton, Cliff. "Client Browser Extensions." In The Web Professional’s Handbook, 180–99. Berkeley, CA: Apress, 2003. http://dx.doi.org/10.1007/978-1-4302-5362-4_5.
Full textKarim, Rezwana, Mohan Dhawan, and Vinod Ganapathy. "Retargetting Legacy Browser Extensions to Modern Extension Frameworks." In ECOOP 2014 – Object-Oriented Programming, 463–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44202-9_19.
Full textRauti, Sampsa. "Man-in-the-browser Attack: A Case Study on Malicious Browser Extensions." In Communications in Computer and Information Science, 60–71. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4825-3_5.
Full textCrowley, Matthew. "Building In-Process Extensions with Browser Helper Objects." In Pro Internet Explorer 8 & 9 Development, 333–42. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-2854-7_13.
Full textWang, Lei, Ji Xiang, Jiwu Jing, and Lingchen Zhang. "Towards Fine-Grained Access Control on Browser Extensions." In Information Security Practice and Experience, 158–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29101-2_11.
Full textPotgieter, Marius, Craig Marais, and Mariana Gerber. "Fostering Content Relevant Information Security Awareness through Browser Extensions." In Information Assurance and Security Education and Training, 58–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39377-8_7.
Full textChang, Wentao, and Songqing Chen. "Defeat Information Leakage from Browser Extensions via Data Obfuscation." In Information and Communications Security, 33–48. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-02726-5_3.
Full textHausknecht, Daniel, Jonas Magazinius, and Andrei Sabelfeld. "May I? - Content Security Policy Endorsement for Browser Extensions." In Detection of Intrusions and Malware, and Vulnerability Assessment, 261–81. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20550-2_14.
Full textLerner, Benjamin S., Liam Elberty, Neal Poole, and Shriram Krishnamurthi. "Verifying Web Browser Extensions’ Compliance with Private-Browsing Mode." In Lecture Notes in Computer Science, 57–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40203-6_4.
Full textAkshay Dev, P. K., and K. P. Jevitha. "STRIDE Based Analysis of the Chrome Browser Extensions API." In Advances in Intelligent Systems and Computing, 169–78. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-3156-4_17.
Full textConference papers on the topic "Browser extensions"
Liu, Lei, Xinwen Zhang, and Songqing Chen. "Botnet with Browser Extensions." In 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust (PASSAT) / 2011 IEEE Third Int'l Conference on Social Computing (SocialCom). IEEE, 2011. http://dx.doi.org/10.1109/passat/socialcom.2011.25.
Full textGuha, Arjun, Matthew Fredrikson, Benjamin Livshits, and Nikhil Swamy. "Verified Security for Browser Extensions." In 2011 IEEE Symposium on Security and Privacy (SP). IEEE, 2011. http://dx.doi.org/10.1109/sp.2011.36.
Full textVarshney, Gaurav, Manoj Misra, and Pradeep K. Atrey. "Detecting Spying and Fraud Browser Extensions." In CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3137616.3137619.
Full textSingh, Kundan, John Yoakum, and Alan Johnston. "Enterprise WebRTC Powered by Browser Extensions." In IPTComm '15: Principles, Systems and Applications of IP Telecommunications. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2843491.2843753.
Full textObimbo, Charlie, Yong Zhou, and Randy Nguyen. "Analysis of Vulnerabilities of Web Browser Extensions." In 2018 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2018. http://dx.doi.org/10.1109/csci46756.2018.00029.
Full textSome, Doliere Francis. "EmPoWeb: Empowering Web Applications with Browser Extensions." In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 2019. http://dx.doi.org/10.1109/sp.2019.00058.
Full textStarov, Oleksii, and Nick Nikiforakis. "XHOUND: Quantifying the Fingerprintability of Browser Extensions." In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017. http://dx.doi.org/10.1109/sp.2017.18.
Full textXing, Xinyu, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci, and Wenke Lee. "Understanding Malvertising Through Ad-Injecting Browser Extensions." In WWW '15: 24th International World Wide Web Conference. Republic and Canton of Geneva, Switzerland: International World Wide Web Conferences Steering Committee, 2015. http://dx.doi.org/10.1145/2736277.2741630.
Full textSjösten, Alexander, Steven Van Acker, and Andrei Sabelfeld. "Discovering Browser Extensions via Web Accessible Resources." In CODASPY '17: Seventh ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3029806.3029820.
Full textDhawan, Mohan, and Vinod Ganapathy. "Analyzing Information Flow in JavaScript-Based Browser Extensions." In 2009 Annual Computer Security Applications Conference (ACSAC). IEEE, 2009. http://dx.doi.org/10.1109/acsac.2009.43.
Full text