Useful Links
Computer Science
Cybersecurity
Browser Security and Exploitation
1. Introduction to Browser Security
2. Browser Architecture Fundamentals
3. Web Technology Foundations
4. Browser Security Models
5. Vulnerability Classifications
6. Browser Exploitation Methodology
7. Exploitation Primitives and Techniques
8. JavaScript Engine Exploitation
9. DOM and Rendering Engine Exploitation
10. Browser Hardening and Mitigations
11. Vulnerability Research Methods
12. Browser Extensions and Plugin Security
13. Emerging Attack Surfaces
14. Security Analysis Tools
Emerging Attack Surfaces
WebAssembly Security
Wasm Runtime Architecture
Linear Memory Model
Execution Environment
Host Function Interface
Wasm Security Boundaries
Memory Safety Guarantees
Control Flow Integrity
Type Safety Enforcement
Wasm-JavaScript Interface
Type Conversion Vulnerabilities
Memory Sharing Issues
Function Import/Export Security
Modern Web APIs
WebGL Security
GPU Memory Access
Shader Compilation Security
Information Disclosure Risks
WebRTC Security
Peer-to-Peer Communication
Media Stream Access
Network Information Leakage
Device Access APIs
WebUSB Security Model
WebHID Permissions
Bluetooth API Risks
Storage APIs
Origin Private File System
Persistent Storage Quotas
Cross-Origin Storage Access
Service Workers
Service Worker Lifecycle
Registration and Installation
Activation and Updates
Termination and Restart
Service Worker Security
Network Request Interception
Cache Manipulation
Background Sync Security
Progressive Web Apps
PWA Installation Process
App Manifest Security
Offline Functionality Risks
Push Notification Security
Previous
12. Browser Extensions and Plugin Security
Go to top
Next
14. Security Analysis Tools