[HTML][HTML] Algorithmic bias in machine learning-based marketing models

S Akter, YK Dwivedi, S Sajib, K Biswas… - Journal of Business …, 2022 - Elsevier
This article introduces algorithmic bias in machine learning (ML) based marketing models.
Although the dramatic growth of algorithmic decision making continues to gain momentum in …

Malicious website identification using design attribute learning

O Naim, D Cohen, I Ben-Gal - International Journal of Information Security, 2023 - Springer
Malicious websites pose a challenging cybersecurity threat. Traditional tools for detecting
malicious websites rely heavily on industry-specific domain knowledge, are maintained by …

A quantitative assessment of security risks based on a multifaceted classification approach

M Jouini, L Ben Arfa Rabai, R Khedri - International Journal of Information …, 2021 - Springer
Abstract Information systems and cloud computing infrastructures are frequently exposed to
various types of threats. Without detection and prevention mechanisms, the threats can …

WRIT: Web Request Integrity and Attestation against Malicious Browser Extensions

G Vasiliadis, A Karampelas, A Shevtsov… - … on Dependable and …, 2023 - ieeexplore.ieee.org
The powerful capabilities of modern browsers have pushed the web application logic to the
user side, in order to minimize latency, increase scalability of the service and improve users' …

Exposing and Addressing Security Vulnerabilities in Browser Text Input Fields

A Nayak, R Khandelwal, K Fawaz - arXiv preprint arXiv:2308.16321, 2023 - arxiv.org
In this work, we perform a comprehensive analysis of the security of text input fields in web
browsers. We find that browsers' coarse-grained permission model violates two security …

Webenclave: protect web secrets from browser extensions with software enclave

X Wang, Y Du, C Wang, Q Wang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Browser extensions are widely used nowadays to customize users' browsers with more
functionalities, meanwhile introduce potential risks due to escalated privileges. Existing …

Man-in-the-browser attacks against IoT devices: A study of smart homes

S Rauti, S Laato, T Pitkämäki - … of the 12th International Conference on …, 2021 - Springer
Smart environments such as smart homes are a collection of IoT devices, sensors, artificial
intelligence and remote control systems. These technologies come with many possible …

Experimental Security Analysis of Sensitive Data Access by Browser Extensions

A Nayak, R Khandelwal, E Fernandes… - Proceedings of the ACM …, 2024 - dl.acm.org
Browser extensions offer a variety of valuable features and functionalities. They also pose a
significant security risk if not properly designed or reviewed. Prior works have shown that …

Safeguard confidential web information from malicious browser extension using Encryption and Isolation techniques

M Marimuthu, G Mohanraj… - Journal of Intelligent …, 2023 - content.iospress.com
Web browsers have become an integral part of our daily lives, granting us access to vast
information and services. However, this convenience significantly risks personal information …

Man-in-the-browser attack: a case study on malicious browser extensions

S Rauti - International Symposium on Security in Computing and …, 2019 - Springer
Abstract Man-in-the-browser (MitB) attacks, often implemented as malicious browser
extensions, have the ability to alter the structure and contents of web pages, and stealthily …