Academic literature on the topic 'Browser Vulnerability'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Browser Vulnerability.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Browser Vulnerability"
Fajar, Abdullah, Setiadi Yazid, ., and . "Web Browser Vulnerabilities and Weakness Descriptive Analysis: Is it Chrome Keep Dominant?" International Journal of Engineering & Technology 7, no. 4.44 (2018): 242. http://dx.doi.org/10.14419/ijet.v7i4.44.26999.
Full textChalyi, Oleksii, Kęstutis Driaunys, and Vytautas Rudžionis. "Assessing Browser Security: A Detailed Study Based on CVE Metrics." Future Internet 17, no. 3 (2025): 104. https://doi.org/10.3390/fi17030104.
Full textJunjie Wang, Xiaohong Li, Bobo Yan, and Zhiyong Feng. "Pointer Analysis Based Vulnerability Detection for Browser Extension." International Journal of Digital Content Technology and its Applications 6, no. 1 (2012): 488–95. http://dx.doi.org/10.4156/jdcta.vol6.issue1.59.
Full textRay, Loye Lynn. "Countering Cross-Site Scripting in Web-based Applications." International Journal of Strategic Information Technology and Applications 6, no. 1 (2015): 57–68. http://dx.doi.org/10.4018/ijsita.2015010105.
Full textJohnston, Reuben, Shahryar Sarkani, Thomas Mazzuchi, Thomas Holzer, and Timothy Eveleigh. "Multivariate models using MCMCBayes for web-browser vulnerability discovery." Reliability Engineering & System Safety 176 (August 2018): 52–61. http://dx.doi.org/10.1016/j.ress.2018.03.024.
Full textPriyanka, K., Krishna P. Yuvan, Kumar JS Ajay, J. Dharun, N. Rooban, and N. Vinayagamoorthy. "Web Extension for Recon." Journal of Research and Review: Hacking Techniques and Information Security Systems 1, no. 2 (2025): 11–16. https://doi.org/10.5281/zenodo.15589787.
Full textJohnston, Reuben, Shahryar Sarkani, Thomas Mazzuchi, Thomas Holzer, and Timothy Eveleigh. "Bayesian-model averaging using MCMCBayes for web-browser vulnerability discovery." Reliability Engineering & System Safety 183 (March 2019): 341–59. http://dx.doi.org/10.1016/j.ress.2018.11.030.
Full textDarmawan, Candra, Julius Panda Putra Naibaho, and Alex De Kweldju. "Penerapan Metode Vulnerability Assessment untuk Identifikasi Keamanan Website berdasarkan OWASP ID Tahun 2021." Edumatic: Jurnal Pendidikan Informatika 8, no. 1 (2024): 272–81. http://dx.doi.org/10.29408/edumatic.v8i1.25834.
Full textWei, Qiang, Ze Hui Wu, Rong Hua Tao, and Dong Ren. "Authentication Algorithm Based on Hash-Tree for Web Single Sign-On." Applied Mechanics and Materials 490-491 (January 2014): 1368–73. http://dx.doi.org/10.4028/www.scientific.net/amm.490-491.1368.
Full textRevyakina, Yelena, Larissa Cherckesova, Olga Safaryan, Denis Korochentsev, Nikolay Boldyrikhin, and Yuri Ivanov. "Possibilities of conducting XSS-attacks and the development of countermeasures." E3S Web of Conferences 224 (2020): 01040. http://dx.doi.org/10.1051/e3sconf/202022401040.
Full textDissertations / Theses on the topic "Browser Vulnerability"
Chi, Tzu-Yen, and 姬子嚴. "Exploit Kit Kill Chain Lab: Automatic website redirect and browser vulnerability exploit." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/49rg5m.
Full textDjeric, Vladan. "Securing Script-based Extensibility in Web Browsers." Thesis, 2009. http://hdl.handle.net/1807/18281.
Full textShahriar, HOSSAIN. "MITIGATION OF WEB-BASED PROGRAM SECURITY VULNERABILITY EXPLOITATIONS." Thesis, 2011. http://hdl.handle.net/1974/6892.
Full textBook chapters on the topic "Browser Vulnerability"
Ter Louw, Mike, Jin Soon Lim, and V. N. Venkatakrishnan. "Extensible Web Browser Security." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73614-1_1.
Full textHausknecht, Daniel, Jonas Magazinius, and Andrei Sabelfeld. "May I? - Content Security Policy Endorsement for Browser Extensions." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-20550-2_14.
Full textYen, Ting-Fang, Xin Huang, Fabian Monrose, and Michael K. Reiter. "Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02918-9_10.
Full textChatzoglou, Efstratios, Vyron Kampourakis, Zisis Tsiatsikas, Georgios Karopoulos, and Georgios Kambourakis. "Keep Your Memory Dump Shut: Unveiling Data Leaks in Password Managers." In ICT Systems Security and Privacy Protection. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-65175-5_5.
Full textDurey, Antonin, Pierre Laperdrix, Walter Rudametkin, and Romain Rouvoy. "FP-Redemption: Studying Browser Fingerprinting Adoption for the Sake of Web Security." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-80825-9_12.
Full textWang, Qin, Xiaohong Li, and Bobo Yan. "A Browser Extension Vulnerability Detecting Approach Based on Behavior Monitoring and Analysis." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34447-3_24.
Full textAmin Azad, Babak, Oleksii Starov, Pierre Laperdrix, and Nick Nikiforakis. "Short Paper - Taming the Shape Shifter: Detecting Anti-fingerprinting Browsers." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-52683-2_8.
Full textLaperdrix, Pierre, Gildas Avoine, Benoit Baudry, and Nick Nikiforakis. "Morellian Analysis for Browsers: Making Web Authentication Stronger with Canvas Fingerprinting." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22038-9_3.
Full textEgele, Manuel, Peter Wurzinger, Christopher Kruegel, and Engin Kirda. "Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks." In Detection of Intrusions and Malware, and Vulnerability Assessment. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02918-9_6.
Full textGupta, Shashank, and B. B. Gupta. "BDS." In Application Development and Design. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3422-8.ch039.
Full textConference papers on the topic "Browser Vulnerability"
Davari, Maryam, and Mohammad Zulkernine. "Analysing vulnerability reproducibility for Firefox browser." In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7906955.
Full textChufeng, Zeng, and Wang Qingxian. "Systematical Vulnerability Detection in Browser Validation Mechanism." In 2011 Seventh International Conference on Computational Intelligence and Security (CIS). IEEE, 2011. http://dx.doi.org/10.1109/cis.2011.188.
Full textLiu, Yuan, Wenbing Zhao, Dan Wang, and Lihua Fu. "A XSS Vulnerability Detection Approach Based on Simulating Browser Behavior." In 2015 2nd International Conference on Information Science and Security (ICISS). IEEE, 2015. http://dx.doi.org/10.1109/icissec.2015.7370974.
Full textKhan, Nayeem, Johari Abdullah, and Adnan Shahid Khan. "Towards vulnerability prevention model for web browser using interceptor approach." In 2015 9th International Conference on IT in Asia (CITA). IEEE, 2015. http://dx.doi.org/10.1109/cita.2015.7349842.
Full textYu, Jianjia, Song Li, Junmin Zhu, and Yinzhi Cao. "CoCo: Efficient Browser Extension Vulnerability Detection via Coverage-guided, Concurrent Abstract Interpretation." In CCS '23: ACM SIGSAC Conference on Computer and Communications Security. ACM, 2023. http://dx.doi.org/10.1145/3576915.3616584.
Full textTurnip, Togu Novriansyah, Hotma Aruan, Anita Lasmaria Siagian, and Leonardo Siagian. "Web Browser Extension Development of Structured Query Language Injection Vulnerability Detection Using Long Short-Term Memory Algorithm." In 2022 IEEE International Conference of Computer Science and Information Technology (ICOSNIKOM). IEEE, 2022. http://dx.doi.org/10.1109/icosnikom56551.2022.10034905.
Full textRaunak, M. S., Richard Kuhn, Richard Kogut, and Raghu Kacker. "Vulnerability trends in web servers and browsers." In HotSoS '20: Hot Topics in the Science of Security. ACM, 2020. http://dx.doi.org/10.1145/3384217.3384227.
Full textAldoseri, Abdulla, and David Oswald. "insecure:// Vulnerability Analysis of URI Scheme Handling in Android Mobile Browsers." In Workshop on Measurements, Attacks, and Defenses for the Web. Internet Society, 2022. http://dx.doi.org/10.14722/madweb.2022.23003.
Full textRadescu, Radu, and Sever Pasca. "ENHANCING THE SECURITY LEVEL OF THE NEW VERSION OF THE EASY-LEARNING ONLINE PLATFORM." In eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-108.
Full textTamanna, Mahzabin, Joseph Stephens, Abdolhossein Sarrafzadeh, and Mohd Anwar. "Exploring User Perspectives on Prioritizing Security through Software Updates." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004772.
Full text