• Title/Summary/Keyword: Web browser

Search Result 628, Processing Time 0.035 seconds

Assessing Web Browser Security Vulnerabilities with respect to CVSS

  • Joh, HyunChul
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.199-206
    • /
    • 2015
  • Since security vulnerabilities newly discovered in a popular Web browser immediately put a number of users at risk, urgent attention from developers is required to address those vulnerabilities. Analysis of characteristics in the Web browser vulnerabilities can be used to assess security risks and to determine the resources needed to develop patches quickly to handle vulnerabilities discovered. So far, being a new research area, the quantitative aspects of the Web browser vulnerabilities and risk assessments have not been fully investigated. However, due to the importance of Web browser software systems, further detailed studies are required related to the Web browser risk assessment, using rigorous analysis of actual data which can assist decision makers to maximize the returns on their security related efforts. In this paper, quantitative software vulnerability analysis has been presented for major Web browsers with respect to the Common Vulnerability Scoring System. Further, vulnerability discovery trends in the Web browsers are also investigated. The results show that, almost all the time, vulnerabilities are compromised from remote networks with no authentication required systems. It is also found that a vulnerability discovery model which was originally introduced for operating systems is also applicable to the Web browsers.

Design and Implementation of Web Browser for Classroom Instruction (교실 수업을 위한 웹 브라우저의 설계 및 구현)

  • Koo, Duk-Hoi
    • Journal of The Korean Association of Information Education
    • /
    • v.9 no.1
    • /
    • pp.139-146
    • /
    • 2005
  • Classroom of latest primary school and secondary school is taking advantage of web activity in instruction. Must use web browser compulsorily to take advantage of web, classroom of our country is using Internet Explorer web browser that offer in Microsoft mostly. This web browser can say that necessary function is very lacking in primary school and secondary school classroom instruction by thing for ordinary people. Thus, to solved lacking, this study presented inconvenient of Internet Explorer web browser that use in existing. And searched improvement plan in reply. Also, embodied web browser that actuality practical use is possible reflecting this in design. Web browser that embody confirmed that satisfaction which is excellent through spot application is. To be more efficient and utilizes as class effectively, this web browser may be beaconed to primary school and secondary school teacher and students of our country.

  • PDF

The PLC Controlling on Web Browser (Web Browser를 이용한 PLC 제어)

  • 김지은;박춘명;이강현
    • Proceedings of the IEEK Conference
    • /
    • 2001.06c
    • /
    • pp.105-108
    • /
    • 2001
  • In this paper, "The PLC Controlling on Web Browser" is designed and implemented to remote control and to monitor FA system. Protocol bidirectional communication with PLC is written and sotted. Then Administration system sets Web server and JAVA Sevelet Program. The client system located at the monitoring Web browser are a JAVA Sevelet base system, and sends some commands to the server system which guards and controls the PLC system. The commands are delivered to the server system and the driver software exists in the server controls the PLC system directly.

  • PDF

A Method for Tracing Internet Usage in Multi-use Web browser Environment and Non-English Speaking Countries (웹 브라우저 다중 사용 환경과 비영어권 국가에서의 인터넷 사용흔적 조사 방법)

  • Lee, Seung-Bong;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.125-132
    • /
    • 2010
  • Web browser is essential application for using internet. If suspect use a web browser for crime, evidence related crime is stored in log file. Therefore, we obtain the useful information related crime as investigating web browser log file. In this paper, we look at the related work and tools for web browser log file. And we introduce analysis methodology of web browser log file focus on the digital forensics. In addition, we apply to our tool at real case.

The Development of the Internet Web Browser for the Blind (시각장애을 위한 인터넷 웹 브라우저 개발)

  • 박찬용;장병태김동현
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.829-832
    • /
    • 1998
  • In this paper, We have developed the Internet web browser for the blind and visually impaired person. The Internet Web browser system consists of personal computer connected to Internet, braille display, voice synthesis devices for character information, tactile display for the representation of web image and braille printer for web page printing. We convert character in the web page to braille and print it to braille display. The image in the web page is printed with tactile display actuated by solenoid. The blind can acess the Internet web site with this web browser system and understand the Internet information.

  • PDF

An Effective Pre-refresh Mechanism for Embedded Web Browser of Mobile Handheld Devices

  • Li Huaqiang;Kim Young-Hak;Kim Tae-Hyung
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.12
    • /
    • pp.1754-1764
    • /
    • 2004
  • Lately mobile handheld devices such as Personal Digital Assistant (PDA) and cellular phones are getting more popular for personal web surfing. However, today most mobile handheld devices have relatively poor web browsing capability due to their low performance so their users have to suffer longer communication latency than those of desktop Personal Computers (PCs). In this paper, we propose an effective pre-refresh mechanism for embedded web browser of mobile handheld devices to reduce this problem. The proposed mechanism uses the idle time to pre-refresh the expired web objects in an embedded web browser's cache memory. It increases the utilization of Central Processing Unit (CPU) power and network bandwidth during the idle time and consequently reduces the client's latency and web browsing cost. An experiment was done using a simulator designed by us to evaluate the efficacy of the proposed mechanism. The experiment result demonstrates that it has a good performance to make web surfing faster.

  • PDF

Remote Monitoring Systems Using StrongARM (StrongARM을 이용한 원격 감시시스템)

  • 임홍식;남현도;강철구
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2003.11a
    • /
    • pp.259-264
    • /
    • 2003
  • In this paper, web based monitoring systems are implemented using embedded Linux. The external equipment is controlled via HTTP protocol and web browser program. HTTP protocol is ported into Linux. A micro web server program and external equipment control program are installed on-board memory using CGI to be accessed by web browser. Experimental result of the proposed web based monitoring systems can be used in automation systems and remote distributed control via internet using web browser.

  • PDF

Analysis of Web Browser Security Configuration Options

  • Jillepalli, Ananth A.;de Leon, Daniel Conte;Steiner, Stuart;Alves-Foss, Jim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6139-6160
    • /
    • 2018
  • For ease of use and access, web browsers are now being used to access and modify sensitive data and systems including critical control systems. Due to their computational capabilities and network connectivity, browsers are vulnerable to several types of attacks, even when fully updated. Browsers are also the main target of phishing attacks. Many browser attacks, including phishing, could be prevented or mitigated by using site-, user-, and device-specific security configurations. However, we discovered that all major browsers expose disparate security configuration procedures, option names, values, and semantics. This results in an extremely hard to secure web browsing ecosystem. We analyzed more than a 1000 browser security configuration options in three major browsers and found that only 13 configuration options had syntactic and semantic similarity, while 4 configuration options had semantic similarity, but not syntactic similarity. We: a) describe the results of our in-depth analysis of browser security configuration options; b) demonstrate the complexity of policy-based configuration of web browsers; c) describe a knowledge-based solution that would enable organizations to implement highly-granular and policy-level secure configurations for their information and operational technology browsing infrastructures at the enterprise scale; and d) argue for necessity of developing a common language and semantics for web browser configurations.

An Effective Mobile Web Object Navigation Based on the Steiner Tree Approach (스타이너트리 기반의 효과적인 모바일 웹 오브젝트 네비게이션)

  • Lee, Woo-Key;Song, Justin Jong-Su;Lee, James J.H.
    • Korean Management Science Review
    • /
    • v.28 no.1
    • /
    • pp.1-10
    • /
    • 2011
  • One of the fundamental roles of web object navigation is to support what the user wants precisely and efficiently from the enormous web database to the web browser. As long as the web search results are a set of individual lists, it is all right to display each and every web result for the web browser to display a web object one by one. However, in case the search results are a collection of multiple interrelated web objects, then there is a need to represent for a new mechanism for linked web objects at a time. We define a unit of web objects derived from a Steiner tree where the web objects include a set of specific keywords calculated by the weight from which the solutions are extracted. Even if a web object does not include all the keywords, then the related hypertext linked web objects are derived and displayed onto the mobile web browser with meta data in one shot. In this paper, it is applied for the mobile browser that the web contents can dynamically be displayed with Steiner trees until each renewal of the navigation request may be issued. In this paper, a new synchronized mobile browsing method is developed so that the navigating time can drastically be reduced and the web navigating efficiency can be dramatically enhanced without sacrificing memory consumption.

The Brassica/Arabidopsis Comparative Genome Browser A Novel Approach to Genome Browsing

  • Lewis Christopher T.;Sharpe Andrew G.;Lydiate Derek J.;Parkin Isobel A.P.
    • Journal of Plant Biotechnology
    • /
    • v.5 no.4
    • /
    • pp.197-200
    • /
    • 2003
  • Scalable Vector Graphics (SVG) has enabled a visually appealing, browser-based application for the display of Brassica sequences relative to Arabidopsis thaliana, and there are currently more than 70,000 B. napus Expressed Sequence Tags (ESTs) displayed. The client side of this browser is based on a Custom Graphical User Interface (CGUI) library which uses SVG, a new web graphics standard, to provide windowing functionality inside the web browser. This windowing functionality, combined with asynchronous data retrieval and client side rendering overcomes two of the key technology imposed drawbacks of current web based browsers: Fixed displays and frequent page reloads. The end result is an intuitive and enjoyable browsing experience. The browser is accessible online from the Brassica / Arabidopsis Genomics Initiative (http://brassica.agr.gc.ca). Inquiries about the browser should be directed to LewisCT@agr.gc.ca.