Browser security

Results: 417



#Item
121

Poster: I Know Where You’ve Been: Geo-Inference Attacks via the Browser Cache Yaoqi Jia∗ , Xinshu Dong† , Zhenkai Liang ∗ , Prateek Saxena∗ ∗ Department of Computer Science, National University of Singapore.

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-05-10 21:30:45
    122

    2011 IEEE Symposium on Security and Privacy R E P RIV: Re-Imagining Content Personalization and In-Browser Privacy Matthew Fredrikson Benjamin Livshits

    Add to Reading List

    Source URL: ieee-security.org

    Language: English - Date: 2011-04-10 18:06:54
      123

      2011 IEEE Symposium on Security and Privacy R E P RIV: Re-Imagining Content Personalization and In-Browser Privacy Matthew Fredrikson Benjamin Livshits

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2011-04-10 18:06:54
        124

        Empowering Browser Security for Mobile Devices Using Smart CDNs Benjamin Livshits and David Molnar Microsoft Research Abstract

        Add to Reading List

        Source URL: w2spconf.com

        Language: English - Date: 2012-02-07 16:10:02
          125

          Exploiting browsers, the logical way Bas Venis ~ ‘Kinine’ Abstract Hacking a browser might seem difficult for people with little experience in the security field. People tend to think exploiting browsers is about buf

          Add to Reading List

          Source URL: conference.hitb.org

          Language: English - Date: 2015-05-28 11:43:38
            126

            2011 IEEE Symposium on Security and Privacy Verified Security for Browser Extensions Arjun Guha Matthew Fredrikson

            Add to Reading List

            Source URL: ieee-security.org

            Language: English - Date: 2011-04-10 18:06:52
              127X86 architecture / MOV / X86 / JMP / Sandbox / NOP / CPUID / X86 assembly language / Computer architecture / X86 instructions / Machine code

              Sandboxing: Software Fault Isolation  Scenarios for Sandboxing  • Web Browser Plug‐ins  o Security hole in plug‐in compromises browser  o Impose restrictions on plug‐in  • Downloaded execut

              Add to Reading List

              Source URL: www.cs.berkeley.edu

              Language: English - Date: 2015-01-21 19:48:42
              128Cryptographic protocols / Secure communication / Electronic commerce / Network architecture / Transport Layer Security / FTPS / HTTP Secure / Public key certificate / SSL-Explorer: Community Edition / Computing / Internet / Internet standards

              SSL Browser & Client Remote Access Browser and Client Global Technology Associates provides a SSL remote access solution featuring both a Browser and a Client for secure network access. GTA SSL Key Features • Seamless

              Add to Reading List

              Source URL: www.gta.com

              Language: English - Date: 2012-12-06 11:43:18
              129

              The Security Architecture of the Chromium Browser Adam Barth∗ Collin Jackson∗ UC Berkeley

              Add to Reading List

              Source URL: www.adambarth.com

              Language: English - Date: 2009-09-29 15:07:10
                130Computer network security / Device fingerprint / Internet fraud / Google Chrome / JavaScript / Internet Explorer 9 / HTTP cookie / Firefox / User agent / Software / Internet privacy / Web browsers

                Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting Martin Mulazzani∗ , Philipp Reschl† , Markus Huber∗ , Manuel Leithner∗ , Sebastian Schrittwieser∗ and Edgar Weippl∗ ∗ SBA

                Add to Reading List

                Source URL: w2spconf.com

                Language: English - Date: 2013-05-23 04:10:01
                UPDATE