Please use this identifier to cite or link to this item: https://idr.l1.nitk.ac.in/jspui/handle/123456789/8237
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNadkarni, T.S.-
dc.contributor.authorMohandas, R.-
dc.contributor.authorPais, A.R.-
dc.date.accessioned2020-03-30T10:18:15Z-
dc.date.available2020-03-30T10:18:15Z-
dc.date.issued2011-
dc.identifier.citationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, Vol.7093 LNCS, , pp.383-386en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/8237-
dc.description.abstractDrive-by downloads are currently one of the most popular methods of malware distribution. Widely visited legitimate websites are infused with invisible or barely visible Iframes pointing to malicious URLs, causing silent download malware on users system. In this paper, we present a client side solution for protection from such malevolent hidden Iframes. We have implemented our solution as an extension to Mozilla Firefox browser. The extension will check every Iframe loaded in the browser for properties emblematic of malicious Iframes such as hidden visibility styles and 0-pixel dimensions. These Iframes are then blocked by using browser content policy mechanism, hence alleviating the possibility of the malicious download taking place. � 2011 Springer-Verlag.en_US
dc.titleIFrandbox - Client side protection from malicious injected iframesen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
File Description SizeFormat 
8237.pdf75.55 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.