A Survey Paper on Browser Extensions to Detect Web Attacks

SD Guru, A Pattnaik, R Kolte, N Sharma… - 2023 14th …, 2023 - ieeexplore.ieee.org
Browser extensions that have been specifically designed to detect online attacks are able to
add a layer of security for users as they browse the internet. Their popularity can be …

A taxonomy of browser attacks

A Saini, MS Gaur, V Laxmi - Handbook of Research on Digital Crime …, 2015 - igi-global.com
Browser attacks over the years have stormed the Internet world with so many malicious
activities. They provide unauthorized access and damage or disrupt user information within …

Hindsight: Understanding the evolution of ui vulnerabilities in mobile browsers

M Luo, O Starov, N Honarmand… - Proceedings of the 2017 …, 2017 - dl.acm.org
Much of recent research on mobile security has focused on malicious applications. Although
mobile devices have powerful browsers that are commonly used by users and are …

[图书][B] Towards secure web browsing

S Tang - 2011 - search.proquest.com
The Web is now the dominant platform for delivering interactive applications to hundreds of
millions of users. Correspondingly, web browsers have become the de facto operating …

An Analysis of Different Browser Attacks and Exploitation Techniques

S Nicula, RD Zota - … Research and Business Technologies: Proceedings of …, 2022 - Springer
Modern browsers are very complex pieces of software, having capabilities, and
functionalities that have been compared to those of the operating systems. Although not …

Top 10 web hacking techniques:" what's possible not probable"

J Grossman - ; login:: the magazine of USENIX & SAGE, 2009 - dialnet.unirioja.es
New attack tecniques provide keen insights into the state of the security of the Web. Web
client attack techniques impact online businesses, reveal what may become the next …

Server-Side Browsers: Exploring the Web's Hidden Attack Surface

M Musch, R Kirchner, M Boll, M Johns - Proceedings of the 2022 ACM on …, 2022 - dl.acm.org
As websites grow ever more dynamic and load more of their content on the fly, automatically
interacting with them via simple tools like curl is getting less of an option. Instead, headless …

Effective detection of vulnerable and malicious browser extensions

H Shahriar, K Weldemariam, M Zulkernine… - Computers & Security, 2014 - Elsevier
Unsafely coded browser extensions can compromise the security of a browser, making them
attractive targets for attackers as a primary vehicle for conducting cyber-attacks. Among …

Malicious browser extensions at scale: Bridging the observability gap between web site and browser

LF DeKoven, S Savage, GM Voelker… - 10th USENIX Workshop …, 2017 - usenix.org
Browser extensions enhance the user experience in a variety of ways. However, to support
these expanded services, extensions are provided with elevated privileges that have made …

A Novel Approach to Detecting and Mitigating Keyloggers

D Elelegwu, L Chen, Y Ji, J Kim - SoutheastCon 2024, 2024 - ieeexplore.ieee.org
As the digital world gets increasingly ingrained in our daily lives, cyberattacks—especially
those involving malware—are growing more complex and common, which calls for …