Please use this identifier to cite or link to this item:
http://idr.nitk.ac.in/jspui/handle/123456789/8237
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Nadkarni, T.S. | - |
dc.contributor.author | Mohandas, R. | - |
dc.contributor.author | Pais, A.R. | - |
dc.date.accessioned | 2020-03-30T10:18:15Z | - |
dc.date.available | 2020-03-30T10:18:15Z | - |
dc.date.issued | 2011 | - |
dc.identifier.citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, Vol.7093 LNCS, , pp.383-386 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/8237 | - |
dc.description.abstract | Drive-by downloads are currently one of the most popular methods of malware distribution. Widely visited legitimate websites are infused with invisible or barely visible Iframes pointing to malicious URLs, causing silent download malware on users system. In this paper, we present a client side solution for protection from such malevolent hidden Iframes. We have implemented our solution as an extension to Mozilla Firefox browser. The extension will check every Iframe loaded in the browser for properties emblematic of malicious Iframes such as hidden visibility styles and 0-pixel dimensions. These Iframes are then blocked by using browser content policy mechanism, hence alleviating the possibility of the malicious download taking place. � 2011 Springer-Verlag. | en_US |
dc.title | IFrandbox - Client side protection from malicious injected iframes | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.