Nothing Special   »   [go: up one dir, main page]

Knittel et al., 2021 - Google Patents

Xsinator. com: From a formal model to the automatic evaluation of cross-site leaks in web browsers

Knittel et al., 2021

View PDF
Document ID
16763973379484057822
Author
Knittel L
Mainka C
Niemietz M
Noß D
Schwenk J
Publication year
Publication venue
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security

External Links

Snippet

Cross-Site Leaks (XS-Leaks) describe a client-side bug that allows an attacker to collect side-channel information from a cross-origin HTTP resource. They are a significant threat to Internet privacy since simply visiting a web page may reveal if the victim is a drug addict or …
Continue reading at dl.acm.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
Sanchez-Rola et al. Extension breakdown: Security analysis of browsers extension resources control policies
Bianchi et al. What the app is that? deception and countermeasures in the android user interface
Andrews et al. How to break web software: Functional and security testing of web applications and web services
Lekies et al. The Unexpected Dangers of Dynamic {JavaScript}
Stock et al. Protecting users against xss-based password manager abuse
Knittel et al. Xsinator. com: From a formal model to the automatic evaluation of cross-site leaks in web browsers
Blankstein et al. Automating isolation and least privilege in web services
Eriksson et al. Hardening the security analysis of browser extensions
Heiderich Towards elimination of xss attacks with a trusted and capability controlled dom
Shahriar et al. Proclick: a framework for testing clickjacking attacks in web applications
Toreini et al. DOMtegrity: ensuring web page integrity against malicious browser extensions
Van Acker et al. Password meters and generators on the web: From large-scale empirical study to getting it right
Gupta et al. Evaluation and monitoring of XSS defensive solutions: a survey, open research issues and future directions
Bui et al. Xss vulnerabilities in cloud-application add-ons
Onarlioglu et al. Sentinel: Securing legacy firefox extensions
Tao et al. Opening a Pandora's box: things you should know in the era of custom GPTs
Kim et al. Extending a hand to attackers: browser privilege escalation attacks via extensions
Sierra et al. Defending your android app
Saini et al. Colluding browser extension attack on user privacy and its implication for web browsers
Saini et al. The darker side of firefox extension
Musch et al. Server-Side Browsers: Exploring the Web's Hidden Attack Surface
Golubovic Attacking browser extensions
Agarwal et al. First, Do No Harm: Studying the manipulation of security headers in browser extensions
Sentana et al. An empirical analysis of security and privacy risks in android cryptocurrency wallet apps
Guan et al. DangerNeighbor attack: Information leakage via postMessage mechanism in HTML5