How To Spot a Browser in a Browser Attack