Back to Results
First PageMeta Content
Greasemonkey / Cross-site scripting / JavaScript / Google Chrome / HTTP cookie / Augmented browsing / Opera / Cross-site request forgery / Code injection / Software / Mozilla add-ons / Portable software


Monkey-in-the-browser: Malware and Vulnerabilities in Augmented Browsing Script Markets Steven Van Acker, Nick Nikiforakis, Lieven Desmet, Frank Piessens, Wouter Joosen {firstname.lastname}@cs.kuleuven.be iMinds-DistriNe
Add to Reading List

Document Date: 2014-04-02 11:29:14


Open Document

File Size: 243,72 KB

Share Result on Facebook

City

New York / Washington / DC / Kyoto / /

Company

Google / Secure IT Systems / GM / /

Country

Japan / United States / /

Currency

USD / /

/

IndustryTerm

web attacker model / web applications / Web-based Malware / augmented browsing software / web mashups / web application / Web Conference / web patrol / Web-based services / web developers / social networking script / internet malware / web security model / /

Organization

JavaScript / U.S. Securities and Exchange Commission / USENIX Association / JS Redirects Misbehaves / Includes / European Union / Internet Society / IEEE Computer Society / /

Person

S. Van Acker / P. H. Phung / G. Vigna / C. Kruegel / P. De Ryck / Y. Brondsema / M. Winslett / S. T. King / P. Agten / S. Bandhakavi / N. Nikiforakis / Frank Piessens / Nick Nikiforakis / F. Piessens / L. Desmet / A. Kapravelos / W. Joosen / P. Madhusudan / /

Position

author / malicious actor / script author / King / /

ProgrammingLanguage

JavaScript / /

ProvinceOrState

New York / /

PublishedMedium

the USENIX annual / /

Technology

API / operating system / HTTP / DOM / /

URL

http /

SocialTag