Privacy Model: Detect Privacy Leakage for Chinese Browser Extensions

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Project Proposal - Detecting Privacy Leakage

The recent emergence of cloud computing has showed an enormous potential for a considerable impact on every aspect of our daily lives. This fad of technological advance, however, raises new privacy concerns which make people hesitate to adopt cloud computing. On the other hand, some new technologies give us a way to preserve privacy. Motivated by this dual role of privacy and the necessity of p...

متن کامل

PRIvacy LEakage Methodology (PRILE) for IDS Rules

This paper introduces a methodology for evaluating PRIvacy LEakage in signature-based Network Intrusion Detection System (IDS) rules. IDS rules that expose more data than a given percentage of all data sessions are defined as privacy leaking. Furthermore, it analyses the IDS rule attack specific pattern size required in order to keep the privacy leakage below a given threshold, presuming that o...

متن کامل

Measuring Privacy Leakage for IDS Rules

This paper proposes a measurement approach for estimating the privacy leakage from Intrusion Detection System (IDS) alarms. Quantitative information flow analysis is used to build a theoretical model of privacy leakage from IDS rules, based on information entropy. This theoretical model is subsequently verified empirically both based on simulations and in an experimental study. The analysis sho...

متن کامل

Privacy Extensions for Stateless Address Autoconfiguration

Nodes use IPv6 stateless address autoconfiguration to generate addresses without the necessity of a DHCP server. Addresses are formed by combining network prefixes with an interface identifier. On interfaces that contain embedded IEEE Identifiers, the interface identifier is typically derived from it. On other interface types, the interface identifier is generated through other means, for examp...

متن کامل

REPRIV: Re-Envisioning In-Browser Privacy

In this paper, we present REPRIV, a system for managing and controlling the release of private information from the browser. We demonstrate how always-on user interest mining can effectively infer user interests in a real browser. We go on to discuss an extension framework that allows third-party code to extract and disseminate more detailed information, as well as language-based techniques for...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: 2169-3536

DOI: 10.1109/access.2021.3063814