Framework to Secure Browser Using Configuration Analysis

2017 ◽  
Vol 11 (2) ◽  
pp. 49-63 ◽  
Author(s):  
Harshad Suryakant Wadkar ◽  
Arun Mishra ◽  
Arati M. Dixit

In last few decades, web browser has become one of the most used computer applications. The web browser is available on many devices such as desktops, laptops, palm devices and even in cars. According to recent research reports, the browser is targeted most by exploits in attacks on both home and corporate users. The default browser security configuration may leak user's sensitive information. It may also give remote code execution facility to attacker. In this paper, a framework to detect web browser security misconfiguration is proposed. The misconfiguration leads to data sharing to third party and insecure data transfer. The system scans browser configuration and determine deviation of configuration from secure settings. In addition, the system provides facility to achieve the level of security configuration with respect to recommended settings.

2018 ◽  
Vol 23 (5) ◽  
pp. 526-538 ◽  
Author(s):  
Shuang Liang ◽  
Yue Zhang ◽  
Bo Li ◽  
Xiaojie Guo ◽  
Chunfu Jia ◽  
...  

Web browsers may delete some files but it doesn’t delete everything. The purpose of private browsing is for users to browse private mode just as a standard browsing session would, but without storing any data such as log-in credentials or browsing history upon exit. A secure framework to secure the web browser artefacts is proposed to fulfil the requirements. In order to compare and contrast the different methods of artefacts encryption, a hybrid method was introduced; Base64 + AES on the prototype. The test systems were created by utilising virtual machines. The prototype was developed using C# language in Microsoft Visual Studio application that runs on Windows. To provide countermeasures, this research proposes an implementation of a third-party privacy application, called PRINDOW, to improve security in hiding a user's browsing activity. Every browsing session is recorded and scanned using the prototype. This method allows only the base requirements to be installed on the virtual machine for each file with the cryptographic method. This framework could theoretically enhance current practises by making slight changes to the web browser's application structure.


Author(s):  
Thomas M. Chen ◽  
Zhi (Judy) Fu

Most people are concerned about online privacy but may not be aware of the various ways that their personal information is collected during routine Web browsing. We review the types of personal information that may be collected voluntarily or involuntarily through the Web browser or disclosed by a Web server. We present a taxonomy of regulatory and technological approaches to protect privacy. All approaches to date have only been partial solutions. By its nature, the Web was designed to be an open system to facilitate data sharing, and hence Web privacy continues to be a challenging problem.


2022 ◽  
Vol 15 (1) ◽  
pp. 1-23
Author(s):  
Rizwan Ur Rahman ◽  
Lokesh Yadav ◽  
Deepak Singh Tomar

Phishing attack is a deceitful attempt to steal the confidential data such as credit card information, and account passwords. In this paper, Phish-Shelter, a novel anti-phishing browser is developed, which analyzes the URL and the content of phishing page. Phish-Shelter is based on combined supervised machine learning model.Phish-Shelter browser uses two novel feature set, which are used to determine the web page identity. The proposed feature sets include eight features to evaluate the obfuscation-based rule, and eight features to identify search engine. Further, we have taken eleven features which are used to discover contents, and blacklist based rule. Phish-Shelter exploited matching identity features, which determines the degree of similarity of a URL with the blacklisted URLs. Proposed features are independent from third-party services such as web browser history or search engines result. The experimental results indicate that, there is a significant improvement in detection accuracy using proposed features over traditional features.


2020 ◽  
Author(s):  
Inge M. N. Wortel ◽  
Johannes Textor

AbstractSummaryThe Cellular Potts Model (CPM) is a powerful in silico method for simulating diverse biological processes at tissue scale. Because of its inherently graphical nature, this model should in theory be accessible to a large audience of biologists – without requiring extensive mathematical expertise. But in practice, CPMs are mostly implemented in specialized frameworks that users need to master before they can run and modify the simulation. We here present Artistoo (Artificial Tissue Toolbox), a JavaScript library for building “explorable” CPM simulations where users can change model parameters and see their effects in real time. Artistoo simulations run directly in the web browser and do not require any third-party software, plugins, or back-end servers. Although implemented in JavaScript, Artistoo does not suffer from a major performance loss compared to frameworks written in C++; it remains sufficiently fast to let users interact with simulations in real time. Artistoo provides an opportunity to unlock CPM models for a broader audience: interactive simulations can be shared through a simple URL in a zero-install setting. We discuss how such model sharing may benefit modelling research, science dissemination, open science, and education.Availability and ImplementationArtistoo is an open-source library released under the MIT license, and is freely available on GitHub at https://github.com/ingewortel/[email protected]


eLife ◽  
2021 ◽  
Vol 10 ◽  
Author(s):  
Inge M N Wortel ◽  
Johannes Textor

The Cellular Potts Model (CPM) is a powerful in silico method for simulating biological processes at tissue scale. Their inherently graphical nature makes CPMs very accessible in theory, but in practice, they are mostly implemented in specialised frameworks users need to master before they can run simulations. We here present Artistoo (Artificial Tissue Toolbox), a JavaScript library for building 'explorable' CPM simulations where viewers can change parameters interactively, exploring their effects in real time. Simulations run directly in the web browser and do not require third-party software, plugins, or back-end servers. The JavaScript implementation imposes no major performance loss compared to frameworks written in C++; Artistoo remains sufficiently fast for interactive, real time simulations. Artistoo provides an opportunity to unlock CPM models for a broader audience: Interactive simulations can be shared via a URL in a zero-install setting. We discuss applications in CPM research, science dissemination, open science, and education.


Cyber Crime ◽  
2013 ◽  
pp. 83-100
Author(s):  
Thomas M. Chen ◽  
Zhi (Judy) Fu

Most people are concerned about online privacy but may not be aware of the various ways that their personal information is collected during routine Web browsing. We review the types of personal information that may be collected voluntarily or involuntarily through the Web browser or disclosed by a Web server. We present a taxonomy of regulatory and technological approaches to protect privacy. All approaches to date have only been partial solutions. By its nature, the Web was designed to be an open system to facilitate data sharing, and hence Web privacy continues to be a challenging problem.


Sign in / Sign up

Export Citation Format

Share Document