The SilentBanker man-in-the-browser attack depends on malicious code that is integrated into the browser. These browser helpers are essentially unlimited in what they can do. Suggest a design by which such helpers are more rigorously controlled. Does your approach limit the usefulness of such helpers?
What will be an ideal response?
Two
possible
answers:
(a)
Limit
the
API
calls
the
helpers
can
make.
(b)
Allow
only
helpers
from
a
curated
app
store,
similar
to
Apple's
App
Store
for
iOS
devices.
Computer Science & Information Technology
You might also like to view...
Web servers store the files that people can access via the Internet using a browser.
a. true b. false
Computer Science & Information Technology
Which of the following is not included in an exception’s stack trace?
a. A descriptive message for the exception. b. The method-call stack at the time the exception occurred. c. The name of the exception. d. Instructions on handling the exception.
Computer Science & Information Technology