<--- Back to Details
First PageDocument Content
Greasemonkey / Cross-site scripting / JavaScript / Google Chrome / HTTP cookie / Augmented browsing / Opera / Cross-site request forgery / Code injection / Software / Mozilla add-ons / Portable software
Date: 2014-04-02 11:29:14
Greasemonkey
Cross-site scripting
JavaScript
Google Chrome
HTTP cookie
Augmented browsing
Opera
Cross-site request forgery
Code injection
Software
Mozilla add-ons
Portable software

Monkey-in-the-browser: Malware and Vulnerabilities in Augmented Browsing Script Markets Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen {firstname.lastname}@cs.kuleuven.be iMinds-DistriNe

Add to Reading List

Source URL: www.securitee.org

Download Document from Source Website

File Size: 243,72 KB

Share Document on Facebook

Similar Documents

Robust Defenses for Cross-Site Request Forgery Adam Barth Collin Jackson  Stanford University

Robust Defenses for Cross-Site Request Forgery Adam Barth Collin Jackson Stanford University

DocID: 1xTKA - View Document

Research Report: Mitigating LangSec Problems With Capabilities Nathaniel Wesley Filardo Johns Hopkins University Baltimore, MD

Research Report: Mitigating LangSec Problems With Capabilities Nathaniel Wesley Filardo Johns Hopkins University Baltimore, MD

DocID: 1rjv6 - View Document

#1 GLOBAL PAYMENTS COMPANY OPTIMIZES SECURE DEVELOPMENT PROCESS WITH PREVOTY Trusted payments provider with deeply embedded secure development culture partners with Prevoty for standardized, real-time application protect

#1 GLOBAL PAYMENTS COMPANY OPTIMIZES SECURE DEVELOPMENT PROCESS WITH PREVOTY Trusted payments provider with deeply embedded secure development culture partners with Prevoty for standardized, real-time application protect

DocID: 1qUCV - View Document

Laboratory for Computer Security Education  1 Cross-Site Scripting (XSS) Attack Lab cWenliang Du, Syracuse University.

Laboratory for Computer Security Education 1 Cross-Site Scripting (XSS) Attack Lab cWenliang Du, Syracuse University.

DocID: 1qOQ9 - View Document

PREVOTY APPLICATION SECURITY MONITOR AND PROTECT YOUR APPLICATIONS AT RUNTIME For hackers, the money is in applications and the databases they access. For enterprises, the distributed, dynamic nature of applications and

PREVOTY APPLICATION SECURITY MONITOR AND PROTECT YOUR APPLICATIONS AT RUNTIME For hackers, the money is in applications and the databases they access. For enterprises, the distributed, dynamic nature of applications and

DocID: 1qxIV - View Document