The purpose of this thesis is to prevent websites located in public internet from accessing user's internal network through web browser. Acquired knowdledge about modern browser's security mechanism - same-origin policy and options of implementing the web browser extensions using WebExtensions, was used in the solution. Proposed solution is based on WebRequest API, which intercepts and modifies HTTP requests, and extends functionality of existing browser extension JavaScript Restrictor with the ability to detect and prevent the browser to be abused as a proxy for scanning and accessing user's internal network. The implemented solution was tested and accepted as a part of JavaScript Restrictor. The main benefit of this thesis is the protecti...
Abstract—Web browser security is lacking and browsers are often unable to detect what is unwanted tr...
The Web has evolved to support sophisticated web applications. These web applications are exposed to...
As the web keeps on expanding, so does the interest of attackers whoseek to exploit users and servic...
‘Web-based Cyber Attacks ’ for leaking private information or making target system to denial of serv...
The purpose of this thesis is to functionally expand the browser extension prototype created by Ing....
The main goal of this thesis is to design and implement a mechanism that provides protection against...
International audienceWe observe a rapid growth of web-based applications every day. These applicati...
Many modern application platforms support an extensible architecture that allows the appli-cation co...
Many modern application platforms support an extensible architecture that allows the application cor...
Building secure web applications is notoriously difficult. The growing importance of JavaScript as a...
The browser has evolved from a simple program that displays static web pages into a continuously-cha...
Abstract— One of the risks of cyber technology is the threat that comes along its benefits: by the v...
JavaScript has become an intrinsic part of web applications. But it has a dynamic execution nature i...
Today the World Wide Web is considered to be a platform for building distributed applications. This ...
This thesis deals with improvements of security and privacy protection of web browser users by enhan...
Abstract—Web browser security is lacking and browsers are often unable to detect what is unwanted tr...
The Web has evolved to support sophisticated web applications. These web applications are exposed to...
As the web keeps on expanding, so does the interest of attackers whoseek to exploit users and servic...
‘Web-based Cyber Attacks ’ for leaking private information or making target system to denial of serv...
The purpose of this thesis is to functionally expand the browser extension prototype created by Ing....
The main goal of this thesis is to design and implement a mechanism that provides protection against...
International audienceWe observe a rapid growth of web-based applications every day. These applicati...
Many modern application platforms support an extensible architecture that allows the appli-cation co...
Many modern application platforms support an extensible architecture that allows the application cor...
Building secure web applications is notoriously difficult. The growing importance of JavaScript as a...
The browser has evolved from a simple program that displays static web pages into a continuously-cha...
Abstract— One of the risks of cyber technology is the threat that comes along its benefits: by the v...
JavaScript has become an intrinsic part of web applications. But it has a dynamic execution nature i...
Today the World Wide Web is considered to be a platform for building distributed applications. This ...
This thesis deals with improvements of security and privacy protection of web browser users by enhan...
Abstract—Web browser security is lacking and browsers are often unable to detect what is unwanted tr...
The Web has evolved to support sophisticated web applications. These web applications are exposed to...
As the web keeps on expanding, so does the interest of attackers whoseek to exploit users and servic...