Protecting the Augmented Browser Extension from Mutation Cross-Site Scripting
- 5 September 2015
- book chapter
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- Monkey-in-the-browserPublished by Association for Computing Machinery (ACM) ,2014
- JSFlowPublished by Association for Computing Machinery (ACM) ,2014
- Architectures for Inlining Security Monitors in Web ApplicationsPublished by Springer Science and Business Media LLC ,2014
- Protecting Web Browser Extensions from JavaScript Injection AttacksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- mXSS attacksPublished by Association for Computing Machinery (ACM) ,2013
- XSS-Dec: A Hybrid Solution to Mitigate Cross-Site Scripting AttacksLecture Notes in Computer Science, 2012
- Saving the world wide web from vulnerable JavaScriptPublished by Association for Computing Machinery (ACM) ,2011
- Structural Learning of Attack Vectors for Generating Mutated XSS AttacksElectronic Proceedings in Theoretical Computer Science, 2010