The Browser Hacker’s Handbook (2014)
Chapter 1. Web Browser Security
Chapter 4. Bypassing the Same Origin Policy
Chapter 7. Attacking Extensions
Chapter 9. Attacking Web Applications
Chapter 10. Attacking Networks
Chapter 11. Epilogue: Final Thoughts