The ghost in the browser analysis of web-based malware
HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
Secure Web Browsing with the OP Web Browser
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Firefox (In) security update dynamics exposed
ACM SIGCOMM Computer Communication Review
Isolating web programs in modern browser architectures
Proceedings of the 4th ACM European conference on Computer systems
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
Leveraging legacy code to deploy desktop applications on the web
OSDI'08 Proceedings of the 8th USENIX conference on Operating systems design and implementation
Expanding the Cloud: A Component-Based Architecture to Application Deployment on the Internet
CCGRID '10 Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing
Mitigating cross-site form history spamming attacks with domain-based ranking
DIMVA'11 Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment
Quire: lightweight provenance for smart phone operating systems
SEC'11 Proceedings of the 20th USENIX conference on Security
International Journal of Automation and Computing
Security bugs in embedded interpreters
Proceedings of the 4th Asia-Pacific Workshop on Systems
Building confederated web-based services with Priv.io
Proceedings of the first ACM conference on Online social networks
Hi-index | 0.00 |
To shield the browser from attacks, Google Chrome developers eyed three key problems.