Analyzing the dangers posed by Chrome Extensions
A common characteristic of modern web browsers is that their functionality can be extended via third-party addons. In this paper we focus on Chrome extensions, to which the Chrome browser exports a rich API: extensions can potentially make network requests, access the local file system, get low-leve...
Saved in:
Main Authors: | BAUER, Lujo, CAI, Shaoying, JIA, Limin, PASSARO, Timothy, TIAN, Yuan |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2014
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/4193 https://ink.library.smu.edu.sg/context/sis_research/article/5196/viewcontent/cns2014_browserattacks.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Security of an ill-posed operator based scheme for image authentication
by: WU, Yongdong, et al.
Published: (2005) -
Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains
by: CAI, Shaoying, et al.
Published: (2012) -
Analysis and Improvements of a Secure E-Tender Submission
by: CAI, Shaoying, et al.
Published: (2008) -
A new framework for privacy of RFID path authentication
by: CAI, Shaoying, et al.
Published: (2012) -
Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains
by: CAI, Shaoying, et al.
Published: (2010)