scholarly journals An Empirical Evaluation of Security Indicators in Mobile Web Browsers

2015 ◽  
Vol 14 (5) ◽  
pp. 889-903 ◽  
Author(s):  
Chaitrali Amrutkar ◽  
Patrick Traynor ◽  
Paul C. van Oorschot
2016 ◽  
Vol 4 (3) ◽  
pp. 51-64 ◽  
Author(s):  
Bimal Aklesh Kumar

Mobile and other PDA devices allow us to access the World Wide Web anytime and anywhere using fully functional mobile web browsers. This study utilizes the mobile web to deliver services to register students for courses at Fiji National University (FNU). Developing dynamic web based applications for mobile devices is a challenging task, because these devices have limited processing power and physical memory. In order to overcome these limitations, the author proposed layered architecture for the development of this system. This paper describes the architecture, design and implementation of the new system. Experimental results demonstrate that proposed architecture can effectively reduce the client side resource utilization (processing power and physical memory) of dynamic mobile web based systems. Furthermore the author conclude this paper by outlining future work for research in this area.


2015 ◽  
Vol 23 (3) ◽  
pp. 333-346 ◽  
Author(s):  
Swapan Purkait

Purpose – This paper aims to report on research that tests the effectiveness of anti-phishing tools in detecting phishing attacks by conducting some real-time experiments using freshly hosted phishing sites. Almost all modern-day Web browsers and antivirus programs provide security indicators to mitigate the widespread problem of phishing on the Internet. Design/methodology/approach – The current work examines and evaluates the effectiveness of five popular Web browsers, two third-party phishing toolbar add-ons and seven popular antivirus programs in terms of their capability to detect locally hosted spoofed websites. The same tools have also been tested against fresh phishing sites hosted on Internet. Findings – The experiments yielded alarming results. Although the success rate against live phishing sites was encouraging, only 3 of the 14 tools tested could successfully detect a single spoofed website hosted locally. Originality/value – This work proposes the inclusion of domain name system server authentication and verification of name servers for a visiting website for all future anti-phishing toolbars. It also proposes that a Web browser should maintain a white list of websites that engage in online monetary transactions so that when a user requires to access any of these, the default protocol should always be HTTPS (Hypertext Transfer Protocol Secure), without which a Web browser should prevent the page from loading.


Author(s):  
Joy Bose ◽  
Dipin Kollencheri Puthenveettil ◽  
Sainath Gadhamsetty Kasi ◽  
Aditya Mohan Bhide

Author(s):  
Eero Aho ◽  
Kimmo Kuusilinna ◽  
Tomi Aarnio ◽  
Janne Pietiainen ◽  
Jari Nikara

2019 ◽  
Vol 35 (20) ◽  
pp. 4179-4180 ◽  
Author(s):  
X Raymond Gao ◽  
Hua Huang

Abstract Summary Pleiotropy plays an important role in furthering our understanding of the shared genetic architecture of different human diseases and traits. However, exploring and visualizing pleiotropic information with currently publicly available tools is limiting and challenging. To aid researchers in constructing and digesting pleiotropic networks, we present PleioNet, a web-based visualization tool for exploring this information across human diseases and traits. This program provides an intuitive and interactive web interface that seamlessly integrates large database queries with visualizations that enable users to quickly explore complex high-dimensional pleiotropic information. PleioNet works on all modern computer and mobile web browsers, making pleiotropic information readily available to a broad range of researchers and clinicians with diverse technical backgrounds. We expect that PleioNet will be an important tool for studying the underlying pleiotropic connections among human diseases and traits. Availability and implementation PleioNet is hosted on Google cloud and freely available at http://www.pleionet.com/.


2015 ◽  
Vol 39 (1) ◽  
pp. 27-40 ◽  
Author(s):  
Charles Roberts ◽  
Graham Wakefield ◽  
Matthew Wright ◽  
JoAnn Kuchera-Morin

Native Web technologies provide great potential for musical expression. We introduce two JavaScript libraries towards this end: Gibberish.js, providing heavily optimized audio DSP, and Interface.js, a GUI toolkit that works with mouse, touch, and motion events. Together they provide a complete system for defining musical instruments that can be used in both desktop and mobile Web browsers. Interface.js also enables control of remote synthesis applications via a server application that translates the socket protocol used by Web interfaces into both MIDI and OSC messages. We have incorporated these libraries into the creative coding environment Gibber, where we provide mapping abstractions that enable users to create digital musical instruments in as little as a single line of code. They can then be published to a central database, enabling new instruments to be created, distributed, and run entirely in the browser.


2021 ◽  
Vol 2021 (2) ◽  
pp. 194-213
Author(s):  
Rasmus Dahlberg ◽  
Tobias Pulls ◽  
Tom Ritter ◽  
Paul Syverson

Abstract The security of the web improved greatly throughout the last couple of years. A large majority of the web is now served encrypted as part of HTTPS, and web browsers accordingly moved from positive to negative security indicators that warn the user if a connection is insecure. A secure connection requires that the server presents a valid certificate that binds the domain name in question to a public key. A certificate used to be valid if signed by a trusted Certificate Authority (CA), but web browsers like Google Chrome and Apple’s Safari have additionally started to mandate Certificate Transparency (CT) logging to overcome the weakest-link security of the CA ecosystem. Tor and the Firefox-based Tor Browser have yet to enforce CT. In this paper, we present privacy-preserving and incrementally-deployable designs that add support for CT in Tor. Our designs go beyond the currently deployed CT enforcements that are based on blind trust: if a user that uses Tor Browser is man-in-the-middled over HTTPS, we probabilistically detect and disclose cryptographic evidence of CA and/or CT log misbehavior. The first design increment allows Tor to play a vital role in the overall goal of CT: detect mis-issued certificates and hold CAs accountable. We achieve this by randomly cross-logging a subset of certificates into other CT logs. The final increments hold misbehaving CT logs accountable, initially assuming that some logs are benign and then without any such assumption. Given that the current CT deployment lacks strong mechanisms to verify if log operators play by the rules, exposing misbehavior is important for the web in general and not just Tor. The full design turns Tor into a system for maintaining a probabilistically-verified view of the CT log ecosystem available from Tor’s consensus. Each increment leading up to it preserves privacy due to and how we use Tor.


2016 ◽  
Vol 58 (1) ◽  
pp. 10-18
Author(s):  
Junyoung Ahn ◽  
Kyungdoh Kim ◽  
Robert W. Proctor
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document