Hot Keywords
Cyber-physical systems Post-quantum cryptography Public-key cryptography Edge computing Anti-forensics Big data security control selection Attacks on IoT systems Domain Name System DNS attacks Network security Transport layer security protocol

Topic: Browser Threats of Software Security

A special issue of Journal of Surveillance, Security and Safety

ISSN 2694-1015 (Online)

Submission deadline: 31 Jan 2023

Guest Editor(s)

  • Prof. S. S. Iyengar

    School of Computing and Information Sciences, Florida International University, Miami, FL, USA.

    Website | E-mail

  • Prof. Richard Brooks

    Holcombe Department of Electrical and Computer Engineering, Clemson University, Clemson, SC, USA.

    Website | E-mail

  • Dr. Latesh Kumar K. J.

    School of Computing and Information Sciences, Florida International University, Miami, FL, USA.

    Website | E-mail

Special Issue Introduction

Security is never-ending and considered to be "Trust no one". Specifically, the Internet must be secured with a safe browser with extra protection procedures that help to detect and prevent unauthorized third-party pursuit while surfing the web. The browsers have a white list that contains specific programs and activities to detect and prevent actions that are not authorized to start up.

The "Trust no one" is a model based on Zero Trust, and in some domains "Verify and Never Trust". Big variations are stirring in the ad-sponsored web, and the browsers have become a key battleground for end-user privacy.   Browser security is the application of Internet security to web browsers in order to protect networked data and computer systems from breaches of privacy or malware. Security exploits of browsers often use JavaScript, sometimes with cross-site scripting (XSS) with a secondary payload using Adobe Flash.

1. Anti-phishing: evaluates and filters suspect links in search results or on a website.
2. Anti-malware: scans and blocks suspect files from being downloaded. 3. Plugin security: evaluates and blocks insecure plugins.
4. Sandbox: isolates the web browser's processes so that it doesn't affect the operating system.

SECBROW aims to create a Special Issue highlighting the methods by which browsers can be used as a Digital Threat or as a countermeasure. Topics include:
● Case studies on browser-based threat effectiveness and countermeasures
● Browser tampering and tamper-resistance
● Browser Trojans and Backdoors
● Reverse engineering and countermeasures
● Browser-aware architectures
● Application of machine learning to browser security
● Integration of browser secure with higher-level software, firmware, and micro-architectures
● Implementation of next-generation cryptography (homomorphic encryption, post-quantum, lightweight, etc.)

SECBROW invites both academics and practitioners to submit papers for consideration in the journal.  Extended conference papers are welcome, provided they have been revised to include at least 25% new content (and the previously published proceedings paper is submitted along with the research paper).  Practitioners are welcome to submit a journal-style research paper or a "Field Notes" paper.  A "Field Notes" paper is a short case report about emerging threats and developments, emphasizing a particular development or application over a rigorous study or proof of security.

Submission Deadline

31 Jan 2023

Submission Information

For Author Instructions, please refer to
For Online Submission, please login at
Submission Deadline: 31 Jan 2023
Contacts: Esther Cao, Assistant Editor,

Published Articles

© 2016-2023 OAE Publishing Inc., except certain content provided by third parties