Browser Security Case Study: Appearances Can Be Deceiving: A discussion with Jeremiah Grossman, Ben Livshits, Rebecca Bace, and George Neville-Neil
Abstract
It seems every day we learn of some new security breach. It’s all there for the taking on the Internet: more and more sensitive data every second. As for privacy, we Facebook, we Google, we bank online, we shop online, we invest online& we put it all out there. And just how well protected is all that personally identifiable information? Not very.
Index Terms
- Browser Security Case Study: Appearances Can Be Deceiving: A discussion with Jeremiah Grossman, Ben Livshits, Rebecca Bace, and George Neville-Neil
Recommendations
Browser security: appearances can be deceiving
A discussion with Jeremiah Grossman, Ben Livshits, Rebecca Bace, and George Neville-Neil
Comments
Information & Contributors
Information
Published In
Copyright © 2012 ACM.
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Published: 20 November 2012
Published in QUEUE Volume 10, Issue 11
Check for updates
Qualifiers
- Case-study
- Popular
- Editor picked
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 48,104Total Downloads
- Downloads (Last 12 months)1,127
- Downloads (Last 6 weeks)57
Reflects downloads up to 25 Dec 2024
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderMagazine Site
View this article on the magazine site (external)
Magazine SiteLogin options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in