[HTML][HTML] Algorithmic bias in machine learning-based marketing models
This article introduces algorithmic bias in machine learning (ML) based marketing models.
Although the dramatic growth of algorithmic decision making continues to gain momentum in …
Although the dramatic growth of algorithmic decision making continues to gain momentum in …
Malicious website identification using design attribute learning
Malicious websites pose a challenging cybersecurity threat. Traditional tools for detecting
malicious websites rely heavily on industry-specific domain knowledge, are maintained by …
malicious websites rely heavily on industry-specific domain knowledge, are maintained by …
A quantitative assessment of security risks based on a multifaceted classification approach
Abstract Information systems and cloud computing infrastructures are frequently exposed to
various types of threats. Without detection and prevention mechanisms, the threats can …
various types of threats. Without detection and prevention mechanisms, the threats can …
WRIT: Web Request Integrity and Attestation against Malicious Browser Extensions
G Vasiliadis, A Karampelas, A Shevtsov… - … on Dependable and …, 2023 - ieeexplore.ieee.org
The powerful capabilities of modern browsers have pushed the web application logic to the
user side, in order to minimize latency, increase scalability of the service and improve users' …
user side, in order to minimize latency, increase scalability of the service and improve users' …
Exposing and Addressing Security Vulnerabilities in Browser Text Input Fields
In this work, we perform a comprehensive analysis of the security of text input fields in web
browsers. We find that browsers' coarse-grained permission model violates two security …
browsers. We find that browsers' coarse-grained permission model violates two security …
Webenclave: protect web secrets from browser extensions with software enclave
Browser extensions are widely used nowadays to customize users' browsers with more
functionalities, meanwhile introduce potential risks due to escalated privileges. Existing …
functionalities, meanwhile introduce potential risks due to escalated privileges. Existing …
Man-in-the-browser attacks against IoT devices: A study of smart homes
Smart environments such as smart homes are a collection of IoT devices, sensors, artificial
intelligence and remote control systems. These technologies come with many possible …
intelligence and remote control systems. These technologies come with many possible …
Experimental Security Analysis of Sensitive Data Access by Browser Extensions
Browser extensions offer a variety of valuable features and functionalities. They also pose a
significant security risk if not properly designed or reviewed. Prior works have shown that …
significant security risk if not properly designed or reviewed. Prior works have shown that …
Safeguard confidential web information from malicious browser extension using Encryption and Isolation techniques
M Marimuthu, G Mohanraj… - Journal of Intelligent …, 2023 - content.iospress.com
Web browsers have become an integral part of our daily lives, granting us access to vast
information and services. However, this convenience significantly risks personal information …
information and services. However, this convenience significantly risks personal information …
Man-in-the-browser attack: a case study on malicious browser extensions
S Rauti - International Symposium on Security in Computing and …, 2019 - Springer
Abstract Man-in-the-browser (MitB) attacks, often implemented as malicious browser
extensions, have the ability to alter the structure and contents of web pages, and stealthily …
extensions, have the ability to alter the structure and contents of web pages, and stealthily …