Abstract
Sealed in a depleted uranium sphere at the bottom of the ocean. That’s the often-mentioned description of what it takes to make a computer reasonably secure. Obviously, in the Internet age or any other, such a machine would be fairly useless.
- Stamos, A., Lackey, Z. 2006. Attacking AJAX web applications. iSEC Partners; http://www.isecpartners.com/ files/iSEC-Attacking_AJAX_Applications.BH2006.pdf.Google Scholar
- Wikipedia. Comparison of Web browsers; http:// en.wikipedia.org/wiki/Comparison_of_web_browsers.Google Scholar
- Wikipedia, HTTP cookie; http://en.wikipedia.org/wiki/ HTTP_cookie.Google Scholar
- Wikipedia. Phishing; http://en.wikipedia.org/wiki/ Phishing.Google Scholar
- Wikipedia. XMLHttpRequest; http://en.wikipedia. org/wiki/XMLHttpRequest.Google Scholar
- Zalewski, M. 2008. Browser Security Handbook. Google; http://code.google.com/p/browsersec/wiki/Main.Google Scholar
Index Terms
- Security in the Browser: Web browsers leave users vulnerable to an ever-growing number of attacks. Can we make them secure while preserving their usability?
Recommendations
Web browser security update effectiveness
CRITIS'09: Proceedings of the 4th international conference on Critical information infrastructures securityWe analyze the effectiveness of different Web browser update mechanisms on various operating systems; from Google Chrome's silent update mechanism to Opera's update requiring a full re-installation. We use anonymized logs from Google's world wide ...
Comments