2008 19th International Symposium on Software Reliability Engineering (ISSRE) 2008
DOI: 10.1109/issre.2008.11
|View full text |Cite
|
Sign up to set email alerts
|

Resolving JavaScript Vulnerabilities in the Browser Runtime

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…In 2008, Ejike Ofuonye et al [20] mark slow into the close off and administration of revolutionary weave consumer influence cryptogram based on practices instrumentation techniques. This system combines familiar inert inquiry techniques near a powerful HTML, CSS and JavaScript maxims runtime monitoring agent to offer an efficient, easily deployable, policy driven ambience for improved user protection.…”
Section: Related Workmentioning
confidence: 99%
“…In 2008, Ejike Ofuonye et al [20] mark slow into the close off and administration of revolutionary weave consumer influence cryptogram based on practices instrumentation techniques. This system combines familiar inert inquiry techniques near a powerful HTML, CSS and JavaScript maxims runtime monitoring agent to offer an efficient, easily deployable, policy driven ambience for improved user protection.…”
Section: Related Workmentioning
confidence: 99%
“…In 2008, Ejike Ofuonye et al [10] mark slow into the close off and administration of revolutionary weave consumer influence cryptogram based on practices instrumentation techniques. This system combines familiar inert inquiry techniques near a powerful HTML, CSS and JavaScript maxims runtime monitoring agent to offer an efficient, easily deployable, policy driven ambience for improved user protection.…”
Section: Related Workmentioning
confidence: 99%
“…The former approach is taken by the BrowserShield tool [28] which performs a deep wrapping of code, requiring run-time parsing and transformation of the code. In more recent work, Ofuonye and Miller [23] show that the high runtime overheads witnessed in BrowserShield can be improved in practice by optimising the instrumentation technique. The lightweight approach refers to techniques which do not require any aggressive code manipulation.…”
Section: The Wrapper Landscapementioning
confidence: 99%
“…Ofuonye and Miller [23] introduced an optimized transformation method to implement wrappers by rewriting objects identified as being vulnerable. Their approach can be viewed as an optimization of the BrowserShield approach [28].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation