Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,196,665 papers from all fields of science
Search
Sign In
Create Free Account
Browser exploit
A browser exploit is a form of malicious code that takes advantage of a flaw or vulnerability in an operating system or piece of software with the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
ActiveX
Botnet
Browser security
Cross-site cooking
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Detecting Exploit Websites Using Browser-based Predictive Analytics
May Almousa
,
Mohd Anwar
Conference on Privacy, Security and Trust
2019
Corpus ID: 209900957
The popularity of Web-based computing has given increase to browser-based cyberattacks. These cyberattacks use websites that…
Expand
2017
2017
Extending the Metasploit Framework to Implement an Evasive Attack Infrastructure
Aubrey Alston
arXiv.org
2017
Corpus ID: 34076761
Given a desired goal of testing the capabilities of mainstream antivirus software against evasive malicious payloads delivered…
Expand
2017
2017
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
Masood Mansoori
2017
Corpus ID: 115265718
Accessing and retrieving users’ browser and network information is a common practice used by advertisers and many online services…
Expand
Review
2013
Review
2013
Phishing Susceptibility and Anti-Phishing Security Strategies-Literature Review
Atul M. Tonge
,
S. R. Chaudhari
2013
Corpus ID: 212538036
— Phishing is a con game that scammers use to collect personal information from unsuspecting users. The false e-mails often look…
Expand
2013
2013
WHAT ARE BROWSER EXPLOIT KITS UP TO ? A LOOK INTO SWEET ORANGE AND PROPACK
Aditya K. Sood
,
R. Enbody
,
Rohit Bansal
2013
Corpus ID: 18019444
At the VB2011 conference, our team discussed the techniques used by the Blackhole and Phoenix browser exploit packs (BEPs) [1] to…
Expand
2011
2011
BROWSER EXPLOIT PACKS - EXPLOITATION TACTICS
Aditya K. Sood
,
R. Enbody
2011
Corpus ID: 55046757
Browser exploit packs have been increasingly used for spreading malware. They use the browser as a medium to infect users. This…
Expand
2011
2011
A Dual Approach to Detect Pharming Attacks at the Client-Side
Sophie Gastellier-Prevost
,
G. G. Granadillo
,
M. Laurent-Maknavicius
4th IFIP International Conference on New…
2011
Corpus ID: 2572815
Pharming attacks - a sophisticated version of phishing attacks - aim to steal users' credentials by redirecting them to a…
Expand
Highly Cited
2010
Highly Cited
2010
Design and Implementation of High Interaction Client Honeypot for Drive-by-Download Attacks
Mitsuaki Akiyama
,
Makoto Iwamura
,
Yuhei Kawakoya
,
Kazufumi Aoki
,
M. Itoh
IEICE transactions on communications
2010
Corpus ID: 25230455
Nowadays, the number of web-browser targeted attacks that lead users to adversaries' web sites and exploit web browser…
Expand
2005
2005
Trusted computing and open source
D. Safford
,
Mimi Zohar
Information Security Technical Report
2005
Corpus ID: 205493234
2003
2003
Web Browser Vulnerabilities 101
Peleus G. Uhley
Login: The Usenix Magazine
2003
Corpus ID: 57759659
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE