Useful Links
Computer Science
Cybersecurity
Browser Security and Exploitation
1. Introduction to Browser Security
2. Browser Architecture Fundamentals
3. Web Technology Foundations
4. Browser Security Models
5. Vulnerability Classifications
6. Browser Exploitation Methodology
7. Exploitation Primitives and Techniques
8. JavaScript Engine Exploitation
9. DOM and Rendering Engine Exploitation
10. Browser Hardening and Mitigations
11. Vulnerability Research Methods
12. Browser Extensions and Plugin Security
13. Emerging Attack Surfaces
14. Security Analysis Tools
DOM and Rendering Engine Exploitation
DOM Object Lifecycle
Object Creation and Initialization
Reference Management
Destruction and Cleanup
Use-After-Free in DOM
Event Handler Exploitation
Node Removal Timing
Callback Function Abuse
DOM API Vulnerabilities
Property Access Validation
Method Parameter Checking
Type Enforcement Bypass
CSS Engine Exploitation
Style Calculation Vulnerabilities
Layout Engine Bugs
Paint Process Exploitation
Media Element Exploitation
Video Decoder Vulnerabilities
Audio Processing Bugs
Codec Implementation Flaws
Previous
8. JavaScript Engine Exploitation
Go to top
Next
10. Browser Hardening and Mitigations