Documents Related by Co-Citation

25 VEX: Vetting Browser Extensions For Security Vulnerabilities – Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett
51 The Multi-Principal OS Construction of the Gazelle Web Browser – Helen J. Wang, Chris Grier, Er Moshchuk, Samuel T. King, Piali Choudhury, Herman Venter
92 Native Client: A Sandbox for Portable, Untrusted x86 Native Code – Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Orm, Shiki Okasaka, Neha Narula, Nicholas Fullagar, Google Inc - 2009
23 Analyzing Information Flow in JavaScript-based Browser Extensions – Mohan Dhawan, Vinod Ganapathy
25 Verified security for browser extensions – Arjun Guha, Matthew Fredrikson, Benjamin Livshits, Nikhil Swamy - 2011
68 Secure web browsing with the OP web browser – Chris Grier, Shuo Tang, Samuel T. King - 2008
7 Enhancing web browser security against malware extensions – M Ter-Louw, J S Lim, V N Venkatakrishnan
55 Gatekeeper: Mostly static enforcement of security and reliability policies for JavaScript code – Benjamin Livshits, Salvatore Guarnieri - 2009
68 Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications – Davide Balzarotti, Marco Cova, Vika Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna - 2007
24 Wedge: Splitting Applications into Reduced-Privilege Compartments – Andrea Bittau, Petr Marchenko, Mark Handley, Brad Karp
6 Abusing Firefox Extensions. Defcon17 – R S Liverani, N Freeman - 2009
60 Staged information flow for JavaScript – Ravi Chugh, Jeffrey A. Meister, Ranjit Jhala, Sorin Lerner - 2009
618 The Protection of Information in Computer Systems – Jerome H. Saltzer, Michael D. Schroeder - 1975
10 SpyShield: Preserving privacy from spy add-ons – L Li, X Wang, J Y Choi - 2007
37 Leveraging Legacy Code to Deploy Desktop Applications on the Web – John R. Douceur, Jeremy Elson, Jon Howell, Jacob R. Lorch
9 Enhancing web browser security against malware extensions – M T Louw, J S Lim, V N Venkatakrishnan - 2008
39 The Effectiveness of Application Permissions – Adrienne Porter Felt, Kate Greenwood, David Wagner - 2011
136 Static Detection of Security Vulnerabilities in Scripting Languages – Yichen Xie, Alex Aiken
39 Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense – Yacin Nadji, Prateek Saxena, Dawn Song