Login / Signup
Vetting browser extensions for security vulnerabilities with VEX.
Sruthi Bandhakavi
Nandit Tiku
Wyatt Pittman
Samuel T. King
P. Madhusudan
Marianne Winslett
Published in:
Commun. ACM (2011)
Keyphrases
</>
security vulnerabilities
intrusion detection
dos attacks
penetration testing
security properties
user interface
web applications
data mining
database management systems
end to end
intrusion detection system
network security