Guest Editor(s)
-
- Prof. S. S. Iyengar
School of Computing and Information Sciences, Florida International University, Miami, FL, USA.
Website | E-mail
-
- Prof. Richard Brooks
Holcombe Department of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA.
Website | E-mail
-
- Dr. Latesh Kumar K. J.
School of Computing and Information Sciences, Florida International University, Miami, FL, USA.
Website | E-mail
Special Issue Introduction
Security is never-ending and considered to be "Trust no one". Specifically, the Internet must be secured with a safe browser with extra protection procedures that help to detect and prevent unauthorized third-party pursuit while surfing the web. The browsers have a white list that contains specific programs and activities to detect and prevent actions that are not authorized to start up.
The "Trust no one" is a model based on Zero Trust, and in some domains "Verify and Never Trust". Big variations are stirring in the ad-sponsored web, and the browsers have become a key battleground for end-user privacy. Browser security is the application of Internet security to web browsers in order to protect networked data and computer systems from breaches of privacy or malware. Security exploits of browsers often use JavaScript, sometimes with cross-site scripting (XSS) with a secondary payload using Adobe Flash.
1. Anti-phishing: evaluates and filters suspect links in search results or on a website.
2. Anti-malware: scans and blocks suspect files from being downloaded.
3. Plugin security: evaluates and blocks insecure plugins.
4. Sandbox: isolates the web browser's processes so that it doesn't affect the operating system.
SECBROW aims to create a Special Issue highlighting the methods by which browsers can be used as a Digital Threat or as a countermeasure. Topics include:
● Case studies on browser-based threat effectiveness and countermeasures
● Browser tampering and tamper-resistance
● Browser Trojans and Backdoors
● Reverse engineering and countermeasures
● Browser-aware architectures
● Application of machine learning to browser security
● Integration of browser secure with higher-level software, firmware, and micro-architectures
● Implementation of next-generation cryptography (homomorphic encryption, post-quantum, lightweight, etc.)
SECBROW invites both academics and practitioners to submit papers for consideration in the journal. Extended conference papers are welcome, provided they have been revised to include at least 25% new content (and the previously published proceedings paper is submitted along with the research paper). Practitioners are welcome to submit a journal-style research paper or a "Field Notes" paper. A "Field Notes" paper is a short case report about emerging threats and developments, emphasizing a particular development or application over a rigorous study or proof of security.
Submission Deadline
31 Jan 2023