2017
DOI: 10.1007/978-3-662-54970-4_26
|View full text |Cite
|
Sign up to set email alerts
|

Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions

Abstract: Modern websites include various types of third-party content such as JavaScript, images, stylesheets, and Flash objects in order to create interactive user interfaces. In addition to explicit inclusion of third-party content by website publishers, ISPs and browser extensions are hijacking web browsing sessions with increasing frequency to inject third-party content (e.g., ads). However, third-party content can also introduce security risks to users of these websites, unbeknownst to both website operators and u… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
30
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 24 publications
(31 citation statements)
references
References 21 publications
1
30
0
Order By: Relevance
“…Although jQuery is an immensely popular library, the fact that searching for "security" or "vulnerability" in the official learning centre returns "Apologies, but nothing matched your search criteria" is an excellent summary of the state of JavaScript library security on the Internet, circa August 2016. 1 A similar lack of adequate information about security issues has also been reported for the Android library ecosystem [3].…”
Section: Discussionsupporting
confidence: 53%
See 2 more Smart Citations
“…Although jQuery is an immensely popular library, the fact that searching for "security" or "vulnerability" in the official learning centre returns "Apologies, but nothing matched your search criteria" is an excellent summary of the state of JavaScript library security on the Internet, circa August 2016. 1 A similar lack of adequate information about security issues has also been reported for the Android library ecosystem [3].…”
Section: Discussionsupporting
confidence: 53%
“…We observed that libraries included by third-party components such as advertising, tracking 1 Ember, the 50 th most popular library in ALEXA (rank 52 in COM), is a notable exception with long-term support versions, a security mailing list, CVEs for vulnerabilities, and affected versions listed in security notices. or social media widget code have a higher rate of vulnerability than other inclusions.…”
Section: Third-party Componentsmentioning
confidence: 95%
See 1 more Smart Citation
“…The Inclusion graph corrects the technical problem of the Referer graph by using the actual inclusion relationships between domains to represent edges, rather than imprecise Referer relationships. We are able to construct Inclusion graphs, thanks to advances in browser instrumentation that allow researchers to conduct web crawls that record the exact provenance of all HTTP(S) requests [6,10,41].…”
Section: Introductionmentioning
confidence: 99%
“…The author was also involved in a set of research papers which are not directly related to this thesis [19,20,55], and would like to thank the collaborators for producing great work in this area.…”
mentioning
confidence: 99%