{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T16:06:51Z","timestamp":1769702811285,"version":"3.49.0"},"reference-count":58,"publisher":"SAGE Publications","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2023,10,4]]},"abstract":"<jats:p>Web browsers have become an integral part of our daily lives, granting us access to vast information and services. However, this convenience significantly risks personal information and data security. One common source of this risk is browser extensions, which users often employ to add new features to their browsers. Unfortunately, these extensions can also pose a security threat, as malicious ones may access and steal sensitive information such as passwords, credit card details, and personal data. The vulnerability of web browsers to malicious extensions is a significant challenge that effectively tackles through robust defence mechanisms. To address this concern, Secure Vault \u2013 API is proposed and designed to safeguard confidential web page content from malicious extensions. The Web Crypto API provides cryptographic functions that protect data during transmission and storage. The Secure Vault encompasses a Sentinel extension responsible for parsing the web page\u2019s Document Object Model (DOM) content and querying for all \u201cvault\u201d elements. The extension then verifies that the DOM content has not been tampered with by any malicious extension by calculating the SHA512 hash value of the concatenated vault elements as a string, with no whitespace between them. With its encryption, hashing, and isolation techniques, the Secure Vault effectively protects confidential web page content from malicious extensions. It provides a secure environment for storing and processing sensitive data, reducing the risk of data breaches caused by malicious extensions. The proposed approach offers significant advantages over existing strategies in terms of protecting confidential web page content from malicious extensions. This not only improves the efficiency and effectiveness of the browser extensions but also ensures compatibility, interoperability and performance across different web browsers with respect to the load time of HTML elements. Users can browse the web and carry out sensitive transactions with peace of mind, knowing their data is safeguarded against theft or manipulation by malicious extensions.<\/jats:p>","DOI":"10.3233\/jifs-233122","type":"journal-article","created":{"date-parts":[[2023,7,28]],"date-time":"2023-07-28T12:14:09Z","timestamp":1690546449000},"page":"6145-6160","source":"Crossref","is-referenced-by-count":13,"title":["Safeguard confidential web information from malicious browser extension using Encryption and Isolation techniques"],"prefix":"10.1177","volume":"45","author":[{"given":"M.","family":"Marimuthu","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, Tamilnadu, India"}]},{"given":"G.","family":"Mohanraj","sequence":"additional","affiliation":[{"name":"Schools of Information Technology and Engineering, Vellore Institute of Technology, Vellore, Tamilnadu, India"}]},{"given":"D.","family":"Karthikeyan","sequence":"additional","affiliation":[{"name":"Schools of Information Technology and Engineering, Vellore Institute of Technology, Vellore, Tamilnadu, India"}]},{"given":"D.","family":"Vidyabharathi","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Sona College of Technology, Salem, Tamilnadu, India"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-233122_ref1","first-page":"429","volume-title":"Building Browser Extensions: Create Modern Extensions for Chrome, Safari, Firefox, and Edge","author":"Frisbie","year":"2022"},{"issue":"6","key":"10.3233\/JIFS-233122_ref2","doi-asserted-by":"crossref","first-page":"1283","DOI":"10.1007\/s10207-022-00610-w","article-title":"Are chrome extensions compliant with the spirit of least privilege?","volume":"21","author":"Picazo-Sanchez","year":"2022","journal-title":"International Journal of Information Security"},{"key":"10.3233\/JIFS-233122_ref3","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1007\/978-3-030-99619-2_44","volume-title":"Advanced Information Networking and Applications: Advanced Information Networking and Applications","author":"Madhusudhan","year":"2022"},{"issue":"6","key":"10.3233\/JIFS-233122_ref4","doi-asserted-by":"crossref","first-page":"3155","DOI":"10.3390\/s23063155","article-title":"Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments","volume":"23","author":"Weichbroth","year":"2023","journal-title":"Sensors"},{"key":"10.3233\/JIFS-233122_ref5","unstructured":"Barth Adam , Felt Adrienne Porter , Saxena Prateek and Boodman Aaron , Protecting browsers from extension vulnerabilities, 2010."},{"key":"10.3233\/JIFS-233122_ref6","first-page":"257","article-title":"Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness","volume":"13","author":"Akhawe","year":"2013","journal-title":"USENIX security symposium"},{"key":"10.3233\/JIFS-233122_ref7","doi-asserted-by":"crossref","unstructured":"Senthilnathan T. , Prabu P. , Sivakumar R. and Sakthivel S. , An enhancing reversible data hiding for secured data using shuffle block key encryption and histogram bit shifting in cloud environment, Cluster Computing 22 (2019), 12839\u201312847. https:\/\/doi.10.1007\/s10586-019-02981-5","DOI":"10.1007\/s10586-018-1765-3"},{"key":"10.3233\/JIFS-233122_ref8","first-page":"1","article-title":"A comprehensive approach to protect browser extensions","author":"Tahir","year":"2018","journal-title":"2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET)"},{"key":"10.3233\/JIFS-233122_ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GUCON47344.2019.8981867https:\/\/doi:10.1109\/GUCON47344.2019.8981867"},{"key":"10.3233\/JIFS-233122_ref10","first-page":"559","article-title":"Secure browsing: Prevention of malicious extensions","author":"Koc","year":"2020","journal-title":"2020 4th International Conference on Computer Science and Engineering (UBMK)"},{"key":"10.3233\/JIFS-233122_ref11","first-page":"102770","article-title":"Protect information from malicious extensions","volume":"60","author":"Mansoor","year":"2021","journal-title":"Journal of Information Security and Applications"},{"key":"10.3233\/JIFS-233122_ref12","first-page":"1","article-title":"Towards secure and trustworthy crowdsourcing: challenges, existing landscape, and future directions","author":"Lian","year":"2022","journal-title":"Wireless Networks"},{"key":"10.3233\/JIFS-233122_ref13","doi-asserted-by":"crossref","unstructured":"Scheffler Sarah and Mayer Jonathan , Sok: Content moderation for end-to-end encryption, arXiv preprint arXiv:2303.03979, (2023).","DOI":"10.56553\/popets-2023-0060"},{"key":"10.3233\/JIFS-233122_ref14","first-page":"151","article-title":"Ad injection at scale: Assessing deceptive advertisement modifications","author":"Thomas","year":"2015","journal-title":"Proc IEEE Symp Secur Privacy"},{"issue":"8","key":"10.3233\/JIFS-233122_ref15","doi-asserted-by":"crossref","first-page":"126","DOI":"10.4236\/ijcns.2022.158010","article-title":"Cross-Site Scripting Attacks and Defensive Techniques: A Comprehensive Survey","volume":"15","author":"Weamie","year":"2022","journal-title":"International Journal of Communications, Network and System Sciences"},{"key":"10.3233\/JIFS-233122_ref16","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1007\/s10207-019-00442-1","article-title":"DOMtegrity: ensuring web page integrity against malicious browser extensions","volume":"18","author":"Toreini","year":"2022","journal-title":"International Journal of Information Security"},{"key":"10.3233\/JIFS-233122_ref17","first-page":"1907","article-title":"Detecting malicious extensions in web browsers","author":"Agarwal","year":"2016","journal-title":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"},{"key":"10.3233\/JIFS-233122_ref18","first-page":"747","article-title":"Towards securing browser extensions","author":"Prakash","year":"2014","journal-title":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security"},{"key":"10.3233\/JIFS-233122_ref19","unstructured":"Kirda E. , Kruegel C. , Vigna G. and Jovanovic N. , Noxes: A client-side solution for mitigating cross-site scripting attacks, In Proceedings of the 2009 30th IEEE, (2009)."},{"key":"10.3233\/JIFS-233122_ref20","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/UBMK.2018.8567333","article-title":"Detecting Malicious Browser Extensions using Machine Learning Techniques","author":"Yasinac","year":"2018","journal-title":"2018 International Conference on Computer Science and Engineering (UBMK)"},{"issue":"4","key":"10.3233\/JIFS-233122_ref21","doi-asserted-by":"publisher","first-page":"4176","DOI":"10.1109\/TSG.2018.2881184","article-title":"Privacy-Preserving and Secure Mechanisms for Smart Grid AMI Data Sharing","volume":"10","author":"Wang","year":"2019","journal-title":"IEEE Transactions on Smart Grid"},{"key":"10.3233\/JIFS-233122_ref22","doi-asserted-by":"publisher","first-page":"30808","DOI":"10.1109\/ACCESS.2020.297364","article-title":"Mitigating Web-Based Attacks: A Comprehensive Analysis of State-of-the-Art Approaches","volume":"8","author":"Flores","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233122_ref23","doi-asserted-by":"publisher","first-page":"64179","DOI":"10.1109\/ACCESS.2018.2872784","article-title":"Secure Personal Data Sharing Scheme in Cloud Computing Environment","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-233122_ref24","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1145\/2771783.2771814","article-title":"Detection and classification of malicious JavaScript via attack behavior modeling","author":"Xue","year":"2015","journal-title":"International Symposium on Software Testing and Analysis"},{"key":"10.3233\/JIFS-233122_ref25","doi-asserted-by":"crossref","first-page":"801","DOI":"10.1007\/s10207-019-00442-1","article-title":"DOMtegrity: ensuring web page integrity against malicious browser extensions","volume":"18","author":"Toreini","year":"2019","journal-title":"Int J Inf Secur"},{"key":"10.3233\/JIFS-233122_ref26","doi-asserted-by":"crossref","unstructured":"Aravind V. and Sethumadhavan M. , A Framework for Analysing the Security of Chrome Extensions, In: Kumar Kundu, M., Mohaatra, D., Konar, A., Chakraborty, A. (eds) Advanced Computing, Networking and Informatics Volume 2. Smart Innovation, Systems and Technologies, vol 28. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-07350-7_30","DOI":"10.1007\/978-3-319-07350-7_30"},{"key":"10.3233\/JIFS-233122_ref27","unstructured":"Moon Dae Sung , Kim Ik Kyun and Choi Yang Seo , Behavior-based malicious code detecting apparatus and method using multiple feature vectors, U.S. Patent 10,089,460, issued October 2, 2018."},{"key":"10.3233\/JIFS-233122_ref28","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1186\/s13174-019-0115-x","article-title":"Detecting web attacks with end-to-end deep learning","volume":"10","author":"Pan","year":"2019","journal-title":"J Internet Serv Appl"},{"key":"10.3233\/JIFS-233122_ref29","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2022.2128944"},{"key":"10.3233\/JIFS-233122_ref30","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.cose.2014.06.005","article-title":"Effective detection of vulnerable and malicious browser extensions","volume":"47","author":"Shahriar","year":"2014","journal-title":"Computers & Security"},{"key":"10.3233\/JIFS-233122_ref31","doi-asserted-by":"publisher","first-page":"926","DOI":"10.1109\/ICEEOT.2017.7970206","article-title":"A framework for securing browser extensions","author":"Singh","year":"2017","journal-title":"2017 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)"},{"key":"10.3233\/JIFS-233122_ref32","doi-asserted-by":"crossref","first-page":"790","DOI":"10.1016\/j.cose.2018.01.013","article-title":"Malicious, URL protection based on attackers\u2019 habitual behavioral analysis","volume":"77","author":"Kim","year":"2018","journal-title":"Computers & Security"},{"key":"10.3233\/JIFS-233122_ref33","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1109\/ACSAC.2009.43","article-title":"Analyzing Information Flow in JavaScript-Based Browser Extensions","author":"Dhawan","year":"2009","journal-title":"2009 Annual Computer Security Applications Conference"},{"issue":"4","key":"10.3233\/JIFS-233122_ref34","first-page":"1108","article-title":"A Framework for Detecting Malicious Browser Extensions","volume":"14","author":"Wang","year":"2019","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.3233\/JIFS-233122_ref35","doi-asserted-by":"crossref","first-page":"1789","DOI":"10.1145\/3460120.3484745","article-title":"DoubleX: Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale","author":"Fass","year":"2021","journal-title":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201921)"},{"key":"10.3233\/JIFS-233122_ref36","doi-asserted-by":"crossref","first-page":"1687","DOI":"10.1145\/3243734.3243823","article-title":"Mystique: Uncovering Information Leakage from Browser Extensions","author":"Chen","year":"2018","journal-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS \u201918)"},{"key":"10.3233\/JIFS-233122_ref37","first-page":"1195","article-title":"Using web cryptography API for secure cloud-based applications","volume":"86","author":"D\u00edaz","year":"2018","journal-title":"Future Generation Computer Systems"},{"key":"10.3233\/JIFS-233122_ref38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICCCNT45670.2019.8945267","article-title":"Towards Building a Secure Web Browser: A Comprehensive Survey","author":"Shams","year":"2019","journal-title":"2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT)"},{"issue":"6","key":"10.3233\/JIFS-233122_ref39","first-page":"1051","article-title":"Understanding user behavior toward browser extensions: An empirical study on Chrome and Firefox","volume":"83","author":"Liu","year":"2017","journal-title":"Journal of Computer and System Sciences"},{"issue":"2","key":"10.3233\/JIFS-233122_ref40","first-page":"537","article-title":"Leveraging TOTP-based two-factor authentication to secure the Internet of Things","volume":"11","author":"Tsalis","year":"2020","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"issue":"3","key":"10.3233\/JIFS-233122_ref41","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1049\/iet-cds.2018.5292","article-title":"Design and development of symmetrical super-lift DC\u2013 AC converter using firefly algorithm for solar-photovoltaic applications","volume":"14","author":"Albert","year":"2020","journal-title":"IET Circuits Devices Syst"},{"issue":"5","key":"10.3233\/JIFS-233122_ref42","first-page":"e12845","article-title":"An Experimental Investigation on solar PV fed modular STATCOM in WECS using Intelligent controller","volume":"31","author":"Vanaja","year":"2021","journal-title":"Int Trans Electr Energ Syst"},{"issue":"3","key":"10.3233\/JIFS-233122_ref43","doi-asserted-by":"publisher","first-page":"2667","DOI":"10.3233\/JIFS-212189","article-title":"A Hybrid Deep Learning Model for Effective Segmentation and Classification of Lung Nodules from CT Images","volume":"42","author":"Murugesan","year":"2021","journal-title":"Journal of Intelligent and Fuzzy System"},{"issue":"4","key":"10.3233\/JIFS-233122_ref44","doi-asserted-by":"publisher","first-page":"4117","DOI":"10.3233\/JIFS-212559","article-title":"Investigation on load harmonic reduction through solar-power utilization in intermittent SSFI using particle swarm, genetic, and modified firefly optimization algorithms","volume":"42","author":"Albert","year":"2022","journal-title":"Journal of Intelligent and Fuzzy System"},{"issue":"12","key":"10.3233\/JIFS-233122_ref45","doi-asserted-by":"publisher","first-page":"e13251","DOI":"10.1002\/2050-7038.13251","article-title":"An improved incipient whale optimization algorithm based robust fault detection and diagnosis for sensorless brushless DC motor drive under external disturbances","volume":"31","author":"Vanchinathan","year":"2021","journal-title":"Int Trans Electr Energ Syst"},{"issue":"6","key":"10.3233\/JIFS-233122_ref46","doi-asserted-by":"publisher","first-page":"5939","DOI":"10.3233\/JIFS-212583","article-title":"Design and Experimental Investigation on VL-MLI Intended for Half Height (H-H) Method to Improve Power Quality Using Modified Particle Swarm Optimization (MPSO) Algorithm","volume":"42","author":"Ramaraju","year":"2022","journal-title":"J Intell Fuzzy Syst"},{"issue":"1","key":"10.3233\/JIFS-233122_ref47","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.3233\/JIFS-213241","article-title":"Design and development of extract maximum power from single-double diode PV model for different environmental condition using BAT optimization algorithm","volume":"43","author":"Thangamuthu","year":"2022","journal-title":"J Intell Fuzzy Syst"},{"issue":"1","key":"10.3233\/JIFS-233122_ref48","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.3233\/JIFS-212668","article-title":"Experimental Investigation and Comparative Harmonic Optimization of AMLI Incorporate Modified Genetic Algorithm Using for Power Quality Improvement","volume":"43","author":"Palanisamy","year":"2022","journal-title":"Journal of Intelligent and Fuzzy System"},{"key":"10.3233\/JIFS-233122_ref49","doi-asserted-by":"crossref","first-page":"1537","DOI":"10.1007\/s40313-021-00892-w","article-title":"Design and Investigation of Solar PV Fed Single-Source Voltage-Lift Multilevel Inverter Using Intelligent Controllers","volume":"33","author":"Albert","year":"1562","journal-title":"J Control Autom Electr Syst"},{"key":"10.3233\/JIFS-233122_ref50","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1109\/MysuruCon52639.2021.9641650","article-title":"Experimental Validation and Integration of Solar PV Fed Modular Multilevel Inverter (MMI) and Flywheel Storage System","author":"Gnanavel","year":"2021","journal-title":"2021 IEEE Mysore Sub Section International Conference"},{"key":"10.3233\/JIFS-233122_ref51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/01430750.2022.2092773","article-title":"Testing and Performance Evaluation of Water Pump Irrigation System using Voltage-Lift Multilevel Inverter","author":"Renoald","year":"2022","journal-title":"International Journal of Ambient Energy"},{"issue":"4","key":"10.3233\/JIFS-233122_ref52","doi-asserted-by":"publisher","first-page":"4395","DOI":"10.3233\/JIFS-220089","article-title":"An Advanced Electrical Vehicle Charging Station Using Adaptive Hybrid Particle Swarm Optimization Intended for Renewable Energy System for Simultaneous Distributions","volume":"43","author":"Albert","year":"2022","journal-title":"Journal of Intelligent and Fuzzy System"},{"issue":"3","key":"10.3233\/JIFS-233122_ref53","first-page":"318","article-title":"An Experimental and Investigation on Asymmetric Modular Multilevel Inverter an Approach with Reduced Number of Semiconductor Devices","volume":"18","author":"Renoald","year":"2022","journal-title":"J Electrical Systems"},{"issue":"5","key":"10.3233\/JIFS-233122_ref54","doi-asserted-by":"publisher","first-page":"5877","DOI":"10.3233\/JIFS-213259","article-title":"An Experimental Simulation Testing of Single-diode PV Integrated MPPT Grid-tied Optimized Control Using Grey Wolf Algorithm","volume":"43","author":"Babypriya","year":"2022","journal-title":"Journal of Intelligent and Fuzzy System"},{"issue":"4","key":"10.3233\/JIFS-233122_ref55","doi-asserted-by":"publisher","first-page":"2498","DOI":"10.11591\/ijpeds.v13.i4.pp2498\u20132505","article-title":"Various PSO methods investigation in renewable and nonrenewable sources","volume":"13","author":"Periasamy","year":"2022","journal-title":"International Journal of Power Electronics and Drive Systems"},{"key":"10.3233\/JIFS-233122_ref56","doi-asserted-by":"crossref","first-page":"2059","DOI":"10.1007\/s11277-023-10372-w","article-title":"A Symmetric Solar Photovoltaic Inverter to Improve Power Quality Using Digital Pulsewidth Modulation Approach","volume":"130","author":"Albert","year":"2023","journal-title":"Wireless Pers Commun"},{"key":"10.3233\/JIFS-233122_ref57","doi-asserted-by":"crossref","first-page":"117078","DOI":"10.1016\/j.enconman.2023.117078","article-title":"Design and investigation of PV string\/central architecture for bayesian fusion technique using grey wolf optimization and flower pollination optimized algorithm","volume":"286","author":"Hemalatha","year":"2023","journal-title":"Energy Conversion and Management"},{"key":"10.3233\/JIFS-233122_ref58","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-231389"}],"updated-by":[{"DOI":"10.1177\/10641246251331509","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000},"record-id":"64697"},{"DOI":"10.1177\/10641246251331509","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T00:00:00Z","timestamp":1744848000000}}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-233122","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T05:22:28Z","timestamp":1769664148000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-233122"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,4]]},"references-count":58,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.3233\/jifs-233122","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,4]]}}}