共 23 条
[1]
Adham Manal., 2013, Financial Cryptography and Data Security, P322
[2]
Alcorn W., 2014, The Browser Hacker's Handbook
[3]
[Anonymous], 2010, P USENIX SEC
[4]
A secure and reliable bootstrap architecture
[J].
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS,
1997,
:65-71
[5]
Analyzing Information Flow in Java']JavaScript-based Browser Extensions
[J].
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE,
2009,
:382-391
[7]
Gibbs Samuel., 2014, The Guardian
[8]
Verified Security for Browser Extensions
[J].
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011),
2011,
:115-130
[9]
Heiderich M, 2011, LECT NOTES COMPUT SC, V6961, P281, DOI 10.1007/978-3-642-23644-0_15
[10]
Jagpal N, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P579