Serveur d'exploration sur l'opéra

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Web Browser Security Update Effectiveness

Identifieur interne : 000042 ( Istex/Corpus ); précédent : 000041; suivant : 000043

Web Browser Security Update Effectiveness

Auteurs : Thomas Duebendorfer ; Stefan Frei

Source :

RBID : ISTEX:F33E44FC332BD9CC1AE60D185005503CB8C89D5E

Abstract

Abstract: We analyze the effectiveness of different Web browser update mechanisms on various operating systems; from Google Chrome’s silent update mechanism to Opera’s update requiring a full re-installation. We use anonymized logs from Google’s world wide distributed Web servers. An analysis of the logged HTTP user-agent strings that Web browsers report when requesting any Web page is used to measure the daily browser version shares in active use. To the best of our knowledge, this is the first global scale measurement of Web browser update effectiveness comparing four different Web browser update strategies including Google Chrome. Our measurements prove that silent updates and little dependency on the underlying operating system are most effective to get users of Web browsers to surf the Web with the latest browser version.

Url:
DOI: 10.1007/978-3-642-14379-3_11

Links to Exploration step

ISTEX:F33E44FC332BD9CC1AE60D185005503CB8C89D5E

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Web Browser Security Update Effectiveness</title>
<author>
<name sortKey="Duebendorfer, Thomas" sort="Duebendorfer, Thomas" uniqKey="Duebendorfer T" first="Thomas" last="Duebendorfer">Thomas Duebendorfer</name>
<affiliation>
<mods:affiliation>Google Switzerland GmbH</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: insecurity-iceberg@tik.ee.ethz.ch</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Frei, Stefan" sort="Frei, Stefan" uniqKey="Frei S" first="Stefan" last="Frei">Stefan Frei</name>
<affiliation>
<mods:affiliation>Swiss Federal Institute of Technology (ETH Zurich)</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:F33E44FC332BD9CC1AE60D185005503CB8C89D5E</idno>
<date when="2010" year="2010">2010</date>
<idno type="doi">10.1007/978-3-642-14379-3_11</idno>
<idno type="url">https://api.istex.fr/document/F33E44FC332BD9CC1AE60D185005503CB8C89D5E/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000042</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Web Browser Security Update Effectiveness</title>
<author>
<name sortKey="Duebendorfer, Thomas" sort="Duebendorfer, Thomas" uniqKey="Duebendorfer T" first="Thomas" last="Duebendorfer">Thomas Duebendorfer</name>
<affiliation>
<mods:affiliation>Google Switzerland GmbH</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: insecurity-iceberg@tik.ee.ethz.ch</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Frei, Stefan" sort="Frei, Stefan" uniqKey="Frei S" first="Stefan" last="Frei">Stefan Frei</name>
<affiliation>
<mods:affiliation>Swiss Federal Institute of Technology (ETH Zurich)</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2010</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">F33E44FC332BD9CC1AE60D185005503CB8C89D5E</idno>
<idno type="DOI">10.1007/978-3-642-14379-3_11</idno>
<idno type="ChapterID">Chap11</idno>
<idno type="ChapterID">11</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: We analyze the effectiveness of different Web browser update mechanisms on various operating systems; from Google Chrome’s silent update mechanism to Opera’s update requiring a full re-installation. We use anonymized logs from Google’s world wide distributed Web servers. An analysis of the logged HTTP user-agent strings that Web browsers report when requesting any Web page is used to measure the daily browser version shares in active use. To the best of our knowledge, this is the first global scale measurement of Web browser update effectiveness comparing four different Web browser update strategies including Google Chrome. Our measurements prove that silent updates and little dependency on the underlying operating system are most effective to get users of Web browsers to surf the Web with the latest browser version.</div>
</front>
</TEI>
<istex>
<corpusName>springer</corpusName>
<author>
<json:item>
<name>Thomas Duebendorfer</name>
<affiliations>
<json:string>Google Switzerland GmbH,</json:string>
<json:string>E-mail: insecurity-iceberg@tik.ee.ethz.ch</json:string>
</affiliations>
</json:item>
<json:item>
<name>Stefan Frei</name>
<affiliations>
<json:string>Swiss Federal Institute of Technology (ETH Zurich),</json:string>
</affiliations>
</json:item>
</author>
<language>
<json:string>eng</json:string>
</language>
<abstract>Abstract: We analyze the effectiveness of different Web browser update mechanisms on various operating systems; from Google Chrome’s silent update mechanism to Opera’s update requiring a full re-installation. We use anonymized logs from Google’s world wide distributed Web servers. An analysis of the logged HTTP user-agent strings that Web browsers report when requesting any Web page is used to measure the daily browser version shares in active use. To the best of our knowledge, this is the first global scale measurement of Web browser update effectiveness comparing four different Web browser update strategies including Google Chrome. Our measurements prove that silent updates and little dependency on the underlying operating system are most effective to get users of Web browsers to surf the Web with the latest browser version.</abstract>
<qualityIndicators>
<score>8.036</score>
<pdfVersion>1.6</pdfVersion>
<pdfPageSize>430 x 660 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<keywordCount>0</keywordCount>
<abstractCharCount>838</abstractCharCount>
<pdfWordCount>5042</pdfWordCount>
<pdfCharCount>30605</pdfCharCount>
<pdfPageCount>14</pdfPageCount>
<abstractWordCount>128</abstractWordCount>
</qualityIndicators>
<title>Web Browser Security Update Effectiveness</title>
<chapterId>
<json:string>Chap11</json:string>
<json:string>11</json:string>
</chapterId>
<genre>
<json:string>research-article</json:string>
</genre>
<serie>
<editor>
<json:item>
<name>David Hutchison</name>
<affiliations>
<json:string>Lancaster University, Lancaster, UK</json:string>
</affiliations>
</json:item>
<json:item>
<name>Takeo Kanade</name>
<affiliations>
<json:string>Carnegie Mellon University, Pittsburgh, PA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Josef Kittler</name>
<affiliations>
<json:string>University of Surrey, Guildford, UK</json:string>
</affiliations>
</json:item>
<json:item>
<name>Jon M. Kleinberg</name>
<affiliations>
<json:string>Cornell University, Ithaca, NY, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Friedemann Mattern</name>
<affiliations>
<json:string>ETH Zurich, Zurich, Switzerland</json:string>
</affiliations>
</json:item>
<json:item>
<name>John C. Mitchell</name>
<affiliations>
<json:string>Stanford University, Stanford, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Moni Naor</name>
<affiliations>
<json:string>Weizmann Institute of Science, Rehovot, Israel</json:string>
</affiliations>
</json:item>
<json:item>
<name>Oscar Nierstrasz</name>
<affiliations>
<json:string>University of Bern, Bern, Switzerland</json:string>
</affiliations>
</json:item>
<json:item>
<name>C. Pandu Rangan</name>
<affiliations>
<json:string>Indian Institute of Technology, Madras, India</json:string>
</affiliations>
</json:item>
<json:item>
<name>Bernhard Steffen</name>
<affiliations>
<json:string>University of Dortmund, Dortmund, Germany</json:string>
</affiliations>
</json:item>
<json:item>
<name>Madhu Sudan</name>
<affiliations>
<json:string>Massachusetts Institute of Technology, MA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Demetri Terzopoulos</name>
<affiliations>
<json:string>University of California, Los Angeles, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Doug Tygar</name>
<affiliations>
<json:string>University of California, Berkeley, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Moshe Y. Vardi</name>
<affiliations>
<json:string>Rice University, Houston, TX, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Gerhard Weikum</name>
<affiliations>
<json:string>Max-Planck Institute of Computer Science, Saarbrücken, Germany</json:string>
</affiliations>
</json:item>
</editor>
<issn>
<json:string>0302-9743</json:string>
</issn>
<genre></genre>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Lecture Notes in Computer Science</title>
<copyrightDate>2010</copyrightDate>
</serie>
<host>
<editor>
<json:item>
<name>Erich Rome</name>
<affiliations>
<json:string>Fraunhofer IAIS, Sankt Augustin, Germany</json:string>
<json:string>E-mail: erich.rome@ais.fraunhofer.de</json:string>
</affiliations>
</json:item>
<json:item>
<name>Robin Bloomfield</name>
<affiliations>
<json:string>Centre for Software Reliability, Northampton Square, City University, London, EC1V 0HB, London, UK</json:string>
<json:string>E-mail: reb@csr.city.ac.uk</json:string>
</affiliations>
</json:item>
</editor>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Performance and Reliability</value>
</json:item>
<json:item>
<value>Computer Communication Networks</value>
</json:item>
<json:item>
<value>Management of Computing and Information Systems</value>
</json:item>
<json:item>
<value>Data Encryption</value>
</json:item>
<json:item>
<value>Special Purpose and Application-Based Systems</value>
</json:item>
<json:item>
<value>System Performance and Evaluation</value>
</json:item>
</subject>
<isbn>
<json:string>978-3-642-14378-6</json:string>
</isbn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Critical Information Infrastructures Security</title>
<bookId>
<json:string>978-3-642-14379-3</json:string>
</bookId>
<volume>6027</volume>
<pages>
<last>137</last>
<first>124</first>
</pages>
<issn>
<json:string>0302-9743</json:string>
</issn>
<genre>
<json:string>Book Series</json:string>
</genre>
<eisbn>
<json:string>978-3-642-14379-3</json:string>
</eisbn>
<copyrightDate>2010</copyrightDate>
<doi>
<json:string>10.1007/978-3-642-14379-3</json:string>
</doi>
</host>
<publicationDate>2010</publicationDate>
<copyrightDate>2010</copyrightDate>
<doi>
<json:string>10.1007/978-3-642-14379-3_11</json:string>
</doi>
<id>F33E44FC332BD9CC1AE60D185005503CB8C89D5E</id>
<fulltext>
<json:item>
<original>true</original>
<mimetype>application/pdf</mimetype>
<extension>pdf</extension>
<uri>https://api.istex.fr/document/F33E44FC332BD9CC1AE60D185005503CB8C89D5E/fulltext/pdf</uri>
</json:item>
<json:item>
<original>false</original>
<mimetype>application/zip</mimetype>
<extension>zip</extension>
<uri>https://api.istex.fr/document/F33E44FC332BD9CC1AE60D185005503CB8C89D5E/fulltext/zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/document/F33E44FC332BD9CC1AE60D185005503CB8C89D5E/fulltext/tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Web Browser Security Update Effectiveness</title>
<respStmt xml:id="ISTEX-API" resp="Références bibliographiques récupérées via GROBID" name="ISTEX-API (INIST-CNRS)"></respStmt>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<availability>
<p>SPRINGER</p>
</availability>
<date>2010</date>
</publicationStmt>
<sourceDesc>
<biblStruct type="inbook">
<analytic>
<title level="a" type="main" xml:lang="en">Web Browser Security Update Effectiveness</title>
<author>
<persName>
<forename type="first">Thomas</forename>
<surname>Duebendorfer</surname>
</persName>
<email>insecurity-iceberg@tik.ee.ethz.ch</email>
<affiliation>Google Switzerland GmbH,</affiliation>
</author>
<author>
<persName>
<forename type="first">Stefan</forename>
<surname>Frei</surname>
</persName>
<affiliation>Swiss Federal Institute of Technology (ETH Zurich),</affiliation>
</author>
</analytic>
<monogr>
<title level="m">Critical Information Infrastructures Security</title>
<title level="m" type="sub">4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papers</title>
<idno type="pISBN">978-3-642-14378-6</idno>
<idno type="eISBN">978-3-642-14379-3</idno>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="DOI">10.1007/978-3-642-14379-3</idno>
<idno type="BookID">978-3-642-14379-3</idno>
<idno type="BookTitleID">212469</idno>
<idno type="BookSequenceNumber">6027</idno>
<idno type="BookVolumeNumber">6027</idno>
<idno type="BookChapterCount">17</idno>
<editor>
<persName>
<forename type="first">Erich</forename>
<surname>Rome</surname>
</persName>
<email>erich.rome@ais.fraunhofer.de</email>
<affiliation>Fraunhofer IAIS, Sankt Augustin, Germany</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Robin</forename>
<surname>Bloomfield</surname>
</persName>
<email>reb@csr.city.ac.uk</email>
<affiliation>Centre for Software Reliability, Northampton Square, City University, London, EC1V 0HB, London, UK</affiliation>
</editor>
<imprint>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<date type="published" when="2010"></date>
<biblScope unit="volume">6027</biblScope>
<biblScope unit="page" from="124">124</biblScope>
<biblScope unit="page" to="137">137</biblScope>
</imprint>
</monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<editor>
<persName>
<forename type="first">David</forename>
<surname>Hutchison</surname>
</persName>
<affiliation>Lancaster University, Lancaster, UK</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Takeo</forename>
<surname>Kanade</surname>
</persName>
<affiliation>Carnegie Mellon University, Pittsburgh, PA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Josef</forename>
<surname>Kittler</surname>
</persName>
<affiliation>University of Surrey, Guildford, UK</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Jon</forename>
<forename type="first">M.</forename>
<surname>Kleinberg</surname>
</persName>
<affiliation>Cornell University, Ithaca, NY, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Friedemann</forename>
<surname>Mattern</surname>
</persName>
<affiliation>ETH Zurich, Zurich, Switzerland</affiliation>
</editor>
<editor>
<persName>
<forename type="first">John</forename>
<forename type="first">C.</forename>
<surname>Mitchell</surname>
</persName>
<affiliation>Stanford University, Stanford, CA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Moni</forename>
<surname>Naor</surname>
</persName>
<affiliation>Weizmann Institute of Science, Rehovot, Israel</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Oscar</forename>
<surname>Nierstrasz</surname>
</persName>
<affiliation>University of Bern, Bern, Switzerland</affiliation>
</editor>
<editor>
<persName>
<forename type="first">C.</forename>
<surname>Pandu Rangan</surname>
</persName>
<affiliation>Indian Institute of Technology, Madras, India</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Bernhard</forename>
<surname>Steffen</surname>
</persName>
<affiliation>University of Dortmund, Dortmund, Germany</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Madhu</forename>
<surname>Sudan</surname>
</persName>
<affiliation>Massachusetts Institute of Technology, MA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Demetri</forename>
<surname>Terzopoulos</surname>
</persName>
<affiliation>University of California, Los Angeles, CA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Doug</forename>
<surname>Tygar</surname>
</persName>
<affiliation>University of California, Berkeley, CA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Moshe</forename>
<forename type="first">Y.</forename>
<surname>Vardi</surname>
</persName>
<affiliation>Rice University, Houston, TX, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Gerhard</forename>
<surname>Weikum</surname>
</persName>
<affiliation>Max-Planck Institute of Computer Science, Saarbrücken, Germany</affiliation>
</editor>
<biblScope>
<date>2010</date>
</biblScope>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="seriesId">558</idno>
</series>
<idno type="istex">F33E44FC332BD9CC1AE60D185005503CB8C89D5E</idno>
<idno type="DOI">10.1007/978-3-642-14379-3_11</idno>
<idno type="ChapterID">Chap11</idno>
<idno type="ChapterID">11</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<creation>
<date>2010</date>
</creation>
<langUsage>
<language ident="en">en</language>
</langUsage>
<abstract xml:lang="en">
<p>Abstract: We analyze the effectiveness of different Web browser update mechanisms on various operating systems; from Google Chrome’s silent update mechanism to Opera’s update requiring a full re-installation. We use anonymized logs from Google’s world wide distributed Web servers. An analysis of the logged HTTP user-agent strings that Web browsers report when requesting any Web page is used to measure the daily browser version shares in active use. To the best of our knowledge, this is the first global scale measurement of Web browser update effectiveness comparing four different Web browser update strategies including Google Chrome. Our measurements prove that silent updates and little dependency on the underlying operating system are most effective to get users of Web browsers to surf the Web with the latest browser version.</p>
</abstract>
<textClass>
<keywords scheme="Book Subject Collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass>
<keywords scheme="Book Subject Group">
<list>
<label>I</label>
<label>I12077</label>
<label>I13022</label>
<label>I24067</label>
<label>I15033</label>
<label>I13030</label>
<label>I13049</label>
<item>
<term>Computer Science</term>
</item>
<item>
<term>Performance and Reliability</term>
</item>
<item>
<term>Computer Communication Networks</term>
</item>
<item>
<term>Management of Computing and Information Systems</term>
</item>
<item>
<term>Data Encryption</term>
</item>
<item>
<term>Special Purpose and Application-Based Systems</term>
</item>
<item>
<term>System Performance and Evaluation</term>
</item>
</list>
</keywords>
</textClass>
</profileDesc>
<revisionDesc>
<change when="2010">Published</change>
<change xml:id="refBibs-istex" who="#ISTEX-API" when="2016-3-2">References added</change>
</revisionDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<original>false</original>
<mimetype>text/plain</mimetype>
<extension>txt</extension>
<uri>https://api.istex.fr/document/F33E44FC332BD9CC1AE60D185005503CB8C89D5E/fulltext/txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="Springer, Publisher found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series>
<SeriesInfo SeriesType="Series" TocLevels="0">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesElectronicISSN>1611-3349</SeriesElectronicISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff1">
<EditorName DisplayOrder="Western">
<GivenName>David</GivenName>
<FamilyName>Hutchison</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff2">
<EditorName DisplayOrder="Western">
<GivenName>Takeo</GivenName>
<FamilyName>Kanade</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff3">
<EditorName DisplayOrder="Western">
<GivenName>Josef</GivenName>
<FamilyName>Kittler</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff4">
<EditorName DisplayOrder="Western">
<GivenName>Jon</GivenName>
<GivenName>M.</GivenName>
<FamilyName>Kleinberg</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff5">
<EditorName DisplayOrder="Western">
<GivenName>Friedemann</GivenName>
<FamilyName>Mattern</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff6">
<EditorName DisplayOrder="Western">
<GivenName>John</GivenName>
<GivenName>C.</GivenName>
<FamilyName>Mitchell</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff7">
<EditorName DisplayOrder="Western">
<GivenName>Moni</GivenName>
<FamilyName>Naor</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff8">
<EditorName DisplayOrder="Western">
<GivenName>Oscar</GivenName>
<FamilyName>Nierstrasz</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff9">
<EditorName DisplayOrder="Western">
<GivenName>C.</GivenName>
<FamilyName>Pandu Rangan</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff10">
<EditorName DisplayOrder="Western">
<GivenName>Bernhard</GivenName>
<FamilyName>Steffen</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff11">
<EditorName DisplayOrder="Western">
<GivenName>Madhu</GivenName>
<FamilyName>Sudan</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff12">
<EditorName DisplayOrder="Western">
<GivenName>Demetri</GivenName>
<FamilyName>Terzopoulos</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff13">
<EditorName DisplayOrder="Western">
<GivenName>Doug</GivenName>
<FamilyName>Tygar</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff14">
<EditorName DisplayOrder="Western">
<GivenName>Moshe</GivenName>
<GivenName>Y.</GivenName>
<FamilyName>Vardi</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff15">
<EditorName DisplayOrder="Western">
<GivenName>Gerhard</GivenName>
<FamilyName>Weikum</FamilyName>
</EditorName>
</Editor>
<Affiliation ID="Aff1">
<OrgName>Lancaster University</OrgName>
<OrgAddress>
<City>Lancaster</City>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff2">
<OrgName>Carnegie Mellon University</OrgName>
<OrgAddress>
<City>Pittsburgh</City>
<State>PA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff3">
<OrgName>University of Surrey</OrgName>
<OrgAddress>
<City>Guildford</City>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff4">
<OrgName>Cornell University</OrgName>
<OrgAddress>
<City>Ithaca</City>
<State>NY</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff5">
<OrgName>ETH Zurich</OrgName>
<OrgAddress>
<City>Zurich</City>
<Country>Switzerland</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff6">
<OrgName>Stanford University</OrgName>
<OrgAddress>
<City>Stanford</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff7">
<OrgName>Weizmann Institute of Science</OrgName>
<OrgAddress>
<City>Rehovot</City>
<Country>Israel</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff8">
<OrgName>University of Bern</OrgName>
<OrgAddress>
<City>Bern</City>
<Country>Switzerland</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff9">
<OrgName>Indian Institute of Technology</OrgName>
<OrgAddress>
<City>Madras</City>
<Country>India</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff10">
<OrgName>University of Dortmund</OrgName>
<OrgAddress>
<City>Dortmund</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff11">
<OrgName>Massachusetts Institute of Technology</OrgName>
<OrgAddress>
<State>MA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff12">
<OrgName>University of California</OrgName>
<OrgAddress>
<City>Los Angeles</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff13">
<OrgName>University of California</OrgName>
<OrgAddress>
<City>Berkeley</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff14">
<OrgName>Rice University</OrgName>
<OrgAddress>
<City>Houston</City>
<State>TX</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff15">
<OrgName>Max-Planck Institute of Computer Science</OrgName>
<OrgAddress>
<City>Saarbrücken</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</SeriesHeader>
<Book Language="En">
<BookInfo BookProductType="Proceedings" ContainsESM="No" Language="En" MediaType="eBook" NumberingDepth="2" NumberingStyle="ContentOnly" OutputMedium="All" TocLevels="0">
<BookID>978-3-642-14379-3</BookID>
<BookTitle>Critical Information Infrastructures Security</BookTitle>
<BookSubTitle>4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papers</BookSubTitle>
<BookVolumeNumber>6027</BookVolumeNumber>
<BookSequenceNumber>6027</BookSequenceNumber>
<BookDOI>10.1007/978-3-642-14379-3</BookDOI>
<BookTitleID>212469</BookTitleID>
<BookPrintISBN>978-3-642-14378-6</BookPrintISBN>
<BookElectronicISBN>978-3-642-14379-3</BookElectronicISBN>
<BookChapterCount>17</BookChapterCount>
<BookCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2010</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I12077" Priority="1" Type="Secondary">Performance and Reliability</BookSubject>
<BookSubject Code="I13022" Priority="2" Type="Secondary">Computer Communication Networks</BookSubject>
<BookSubject Code="I24067" Priority="3" Type="Secondary">Management of Computing and Information Systems</BookSubject>
<BookSubject Code="I15033" Priority="4" Type="Secondary">Data Encryption</BookSubject>
<BookSubject Code="I13030" Priority="5" Type="Secondary">Special Purpose and Application-Based Systems</BookSubject>
<BookSubject Code="I13049" Priority="6" Type="Secondary">System Performance and Evaluation</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
<BookContext>
<SeriesID>558</SeriesID>
</BookContext>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff16">
<EditorName DisplayOrder="Western">
<GivenName>Erich</GivenName>
<FamilyName>Rome</FamilyName>
</EditorName>
<Contact>
<Email>erich.rome@ais.fraunhofer.de</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff17">
<EditorName DisplayOrder="Western">
<GivenName>Robin</GivenName>
<FamilyName>Bloomfield</FamilyName>
</EditorName>
<Contact>
<Email>reb@csr.city.ac.uk</Email>
</Contact>
</Editor>
<Affiliation ID="Aff16">
<OrgName>Fraunhofer IAIS</OrgName>
<OrgAddress>
<City>Sankt Augustin</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff17">
<OrgDivision>Centre for Software Reliability, Northampton Square</OrgDivision>
<OrgName>City University, London</OrgName>
<OrgAddress>
<Postcode>EC1V 0HB</Postcode>
<City>London</City>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</BookHeader>
<Chapter ID="Chap11" Language="En">
<ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" NumberingDepth="2" NumberingStyle="ContentOnly" TocLevels="0">
<ChapterID>11</ChapterID>
<ChapterDOI>10.1007/978-3-642-14379-3_11</ChapterDOI>
<ChapterSequenceNumber>11</ChapterSequenceNumber>
<ChapterTitle Language="En">Web Browser Security Update Effectiveness</ChapterTitle>
<ChapterFirstPage>124</ChapterFirstPage>
<ChapterLastPage>137</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2010</CopyrightYear>
</ChapterCopyright>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext>
<SeriesID>558</SeriesID>
<BookID>978-3-642-14379-3</BookID>
<BookTitle>Critical Information Infrastructures Security</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author AffiliationIDS="Aff18">
<AuthorName DisplayOrder="Western">
<GivenName>Thomas</GivenName>
<FamilyName>Duebendorfer</FamilyName>
</AuthorName>
<Contact>
<Email>insecurity-iceberg@tik.ee.ethz.ch</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff19">
<AuthorName DisplayOrder="Western">
<GivenName>Stefan</GivenName>
<FamilyName>Frei</FamilyName>
</AuthorName>
<Contact>
<URL>http://www.techzoom.net/silent-updates</URL>
</Contact>
</Author>
<Affiliation ID="Aff18">
<OrgName>Google Switzerland GmbH</OrgName>
<OrgAddress>
<Country> </Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff19">
<OrgName>Swiss Federal Institute of Technology (ETH Zurich)</OrgName>
<OrgAddress>
<Country> </Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>We analyze the effectiveness of different Web browser update mechanisms on various operating systems; from Google Chrome’s silent update mechanism to Opera’s update requiring a full re-installation. We use anonymized logs from Google’s world wide distributed Web servers. An analysis of the logged HTTP user-agent strings that Web browsers report when requesting any Web page is used to measure the daily browser version shares in active use. To the best of our knowledge, this is the first global scale measurement of Web browser update effectiveness comparing four different Web browser update strategies including Google Chrome. Our measurements prove that silent updates and little dependency on the underlying operating system are most effective to get users of Web browsers to surf the Web with the latest browser version.</Para>
</Abstract>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Web Browser Security Update Effectiveness</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA" lang="en">
<title>Web Browser Security Update Effectiveness</title>
</titleInfo>
<name type="personal">
<namePart type="given">Thomas</namePart>
<namePart type="family">Duebendorfer</namePart>
<affiliation>Google Switzerland GmbH</affiliation>
<affiliation>E-mail: insecurity-iceberg@tik.ee.ethz.ch</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Stefan</namePart>
<namePart type="family">Frei</namePart>
<affiliation>Swiss Federal Institute of Technology (ETH Zurich)</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre type="research-article" displayLabel="OriginalPaper"></genre>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2010</dateIssued>
<copyrightDate encoding="w3cdtf">2010</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<internetMediaType>text/html</internetMediaType>
</physicalDescription>
<abstract lang="en">Abstract: We analyze the effectiveness of different Web browser update mechanisms on various operating systems; from Google Chrome’s silent update mechanism to Opera’s update requiring a full re-installation. We use anonymized logs from Google’s world wide distributed Web servers. An analysis of the logged HTTP user-agent strings that Web browsers report when requesting any Web page is used to measure the daily browser version shares in active use. To the best of our knowledge, this is the first global scale measurement of Web browser update effectiveness comparing four different Web browser update strategies including Google Chrome. Our measurements prove that silent updates and little dependency on the underlying operating system are most effective to get users of Web browsers to surf the Web with the latest browser version.</abstract>
<relatedItem type="host">
<titleInfo>
<title>Critical Information Infrastructures Security</title>
<subTitle>4th International Workshop, CRITIS 2009, Bonn, Germany, September 30 - October 2, 2009. Revised Papers</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">Erich</namePart>
<namePart type="family">Rome</namePart>
<affiliation>Fraunhofer IAIS, Sankt Augustin, Germany</affiliation>
<affiliation>E-mail: erich.rome@ais.fraunhofer.de</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Robin</namePart>
<namePart type="family">Bloomfield</namePart>
<affiliation>Centre for Software Reliability, Northampton Square, City University, London, EC1V 0HB, London, UK</affiliation>
<affiliation>E-mail: reb@csr.city.ac.uk</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="Book Series" displayLabel="Proceedings"></genre>
<originInfo>
<copyrightDate encoding="w3cdtf">2010</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book Subject Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book Subject Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I12077">Performance and Reliability</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I13022">Computer Communication Networks</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I24067">Management of Computing and Information Systems</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I15033">Data Encryption</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I13030">Special Purpose and Application-Based Systems</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I13049">System Performance and Evaluation</topic>
</subject>
<identifier type="DOI">10.1007/978-3-642-14379-3</identifier>
<identifier type="ISBN">978-3-642-14378-6</identifier>
<identifier type="eISBN">978-3-642-14379-3</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="BookTitleID">212469</identifier>
<identifier type="BookID">978-3-642-14379-3</identifier>
<identifier type="BookChapterCount">17</identifier>
<identifier type="BookVolumeNumber">6027</identifier>
<identifier type="BookSequenceNumber">6027</identifier>
<part>
<date>2010</date>
<detail type="volume">
<number>6027</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>124</start>
<end>137</end>
</extent>
</part>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2010</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">David</namePart>
<namePart type="family">Hutchison</namePart>
<affiliation>Lancaster University, Lancaster, UK</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Takeo</namePart>
<namePart type="family">Kanade</namePart>
<affiliation>Carnegie Mellon University, Pittsburgh, PA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Josef</namePart>
<namePart type="family">Kittler</namePart>
<affiliation>University of Surrey, Guildford, UK</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jon</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Kleinberg</namePart>
<affiliation>Cornell University, Ithaca, NY, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Friedemann</namePart>
<namePart type="family">Mattern</namePart>
<affiliation>ETH Zurich, Zurich, Switzerland</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">John</namePart>
<namePart type="given">C.</namePart>
<namePart type="family">Mitchell</namePart>
<affiliation>Stanford University, Stanford, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moni</namePart>
<namePart type="family">Naor</namePart>
<affiliation>Weizmann Institute of Science, Rehovot, Israel</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Oscar</namePart>
<namePart type="family">Nierstrasz</namePart>
<affiliation>University of Bern, Bern, Switzerland</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">C.</namePart>
<namePart type="family">Pandu Rangan</namePart>
<affiliation>Indian Institute of Technology, Madras, India</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bernhard</namePart>
<namePart type="family">Steffen</namePart>
<affiliation>University of Dortmund, Dortmund, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Madhu</namePart>
<namePart type="family">Sudan</namePart>
<affiliation>Massachusetts Institute of Technology, MA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Demetri</namePart>
<namePart type="family">Terzopoulos</namePart>
<affiliation>University of California, Los Angeles, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Doug</namePart>
<namePart type="family">Tygar</namePart>
<affiliation>University of California, Berkeley, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moshe</namePart>
<namePart type="given">Y.</namePart>
<namePart type="family">Vardi</namePart>
<affiliation>Rice University, Houston, TX, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Weikum</namePart>
<affiliation>Max-Planck Institute of Computer Science, Saarbrücken, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<copyrightDate encoding="w3cdtf">2010</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2010</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">F33E44FC332BD9CC1AE60D185005503CB8C89D5E</identifier>
<identifier type="DOI">10.1007/978-3-642-14379-3_11</identifier>
<identifier type="ChapterID">Chap11</identifier>
<identifier type="ChapterID">11</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer-Verlag Berlin Heidelberg</accessCondition>
<recordInfo>
<recordContentSource>SPRINGER</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2010</recordOrigin>
</recordInfo>
</mods>
</metadata>
<enrichments>
<istex:refBibTEI uri="https://api.istex.fr/document/F33E44FC332BD9CC1AE60D185005503CB8C89D5E/enrichments/refBib">
<teiHeader></teiHeader>
<text>
<front></front>
<body></body>
<back>
<listBibl>
<biblStruct xml:id="b0">
<monogr>
<title level="m" type="main">Understanding the Web browser threat</title>
<author>
<persName>
<forename type="first">S</forename>
<surname>Frei</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">T</forename>
<surname>Duebendorfer</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">G</forename>
<surname>Ollmann</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">M</forename>
<surname>May</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">Eth</forename>
<surname>Tik</surname>
</persName>
</author>
<author>
<persName>
<surname>Zurich</surname>
</persName>
</author>
<imprint>
<date type="published" when="2008-06"></date>
<pubPlace>Las Vegas, USA</pubPlace>
</imprint>
</monogr>
<note>Presented. at DefCon 16</note>
</biblStruct>
<biblStruct xml:id="b1">
<analytic>
<title level="a" type="main">Modelling the Security Ecosystem -The Dynamics of (In)Security</title>
<author>
<persName>
<forename type="first">S</forename>
<surname>Frei</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">D</forename>
<surname>Schatzmann</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">B</forename>
<surname>Plattner</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">B</forename>
<surname>Trammel</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="m">Workshop on the Economics of Information Security (WEIS), UK</title>
<imprint>
<date type="published" when="2009-06"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b2">
<analytic>
<title level="a" type="main">How a cybergang operates a network of 1.9 million infected computers</title>
<author>
<persName>
<surname>Finjan</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="j">MCRC Blog</title>
<imprint>
<date type="published" when="2009-04"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b3">
<analytic>
<title level="a" type="main">Firefox (In)security update dynamics exposed</title>
<author>
<persName>
<forename type="first">S</forename>
<surname>Frei</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">T</forename>
<surname>Duebendorfer</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">B</forename>
<surname>Plattner</surname>
</persName>
</author>
</analytic>
<monogr>
<title level="j">SIGCOMM Comput. Commun. Rev</title>
<imprint>
<biblScope unit="volume">39</biblScope>
<biblScope unit="issue">1</biblScope>
<biblScope unit="page" from="16" to="22"></biblScope>
<date type="published" when="2009"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b4">
<monogr>
<title level="m" type="main">Why Silent Updates Boost Security</title>
<author>
<persName>
<forename type="first">T</forename>
<surname>Duebendorfer</surname>
</persName>
</author>
<author>
<persName>
<forename type="first">S</forename>
<surname>Frei</surname>
</persName>
</author>
<imprint>
<date type="published" when="2009-03"></date>
<pubPlace>TIK, ETH Zurich</pubPlace>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b5">
<analytic>
<title level="a" type="main">Common Vulnerability Scoring System (CVSS) Calculator, http://nvd.nist.gov/cvss.cfm?calculator&version=2 9. Omaha, the open source Google Updater</title>
</analytic>
<monogr>
<title level="j">Microsoft Security Bulletin</title>
<imprint>
<biblScope unit="volume">08078</biblScope>
<date type="published" when="2008-12"></date>
</imprint>
</monogr>
</biblStruct>
<biblStruct xml:id="b6">
<analytic>
<title></title>
</analytic>
<monogr>
<title level="j">NetApplications.com. Search Engine Worldwide Market Share</title>
<imprint>
<date type="published" when="2009-03"></date>
</imprint>
</monogr>
</biblStruct>
</listBibl>
</back>
</text>
</istex:refBibTEI>
</enrichments>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Musique/explor/OperaV1/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000042 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 000042 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Musique
   |area=    OperaV1
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:F33E44FC332BD9CC1AE60D185005503CB8C89D5E
   |texte=   Web Browser Security Update Effectiveness
}}

Wicri

This area was generated with Dilib version V0.6.21.
Data generation: Thu Apr 14 14:59:05 2016. Site generation: Thu Jan 4 23:09:23 2024