Inlined information flow monitoring for JavaScript

A Chudnov, DA Naumann - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Extant security mechanisms for web apps, notably the" same-origin policy", are not sufficient
to achieve confidentiality and integrity goals for the many apps that manipulate sensitive …

[HTML][HTML] Formal methods for web security

M Bugliesi, S Calzavara, R Focardi - … of Logical and Algebraic Methods in …, 2017 - Elsevier
In the last few years, many security researchers proposed to endow the web platform with
more rigorous foundations, thus allowing for a precise reasoning on web security issues …

{WPSE}: Fortifying Web Protocols via {Browser-Side} Security Monitoring

S Calzavara, R Focardi, M Maffei… - 27th USENIX Security …, 2018 - usenix.org
We present WPSE, a browser-side security monitor for web protocols designed to ensure
compliance with the intended protocol flow, as well as confidentiality and integrity properties …

Multiple facets for dynamic information flow with exceptions

TH Austin, T Schmitz, C Flanagan - ACM Transactions on Programming …, 2017 - dl.acm.org
JavaScript is the source of many security problems, including cross-site scripting attacks and
malicious advertising code. Central to these problems is the fact that code from untrusted …

SoK: All or nothing-a postmortem of solutions to the third-party script inclusion permission model and a path forward

S Sprecher, C Kerschbaumer… - 2022 IEEE 7th European …, 2022 - ieeexplore.ieee.org
The web execution model allows third-party JavaScript to be leveraged in a single execution
context. Access control for these scripts is currently all or nothing. It has been this way for …

Tainted Secure Multi-Execution to Restrict Attacker Influence

MK McCall, A Bichhawat, L Jia - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Attackers can steal sensitive user information from web pages via third-party scripts. Prior
work shows that secure multi-execution (SME) with declassification is useful for mitigating …

Fine-Grained Data-Centric Content Protection Policy for Web Applications

Z Wang, W Meng, MR Lyu - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
The vast amount of sensitive data in modern web applications has become a prime target for
cyberattacks. Existing browser security policies disallow the execution of unknown scripts …

A principled approach to tracking information flow in the presence of libraries

D Hedin, A Sjösten, F Piessens, A Sabelfeld - … , POST 2017, Held as Part of …, 2017 - Springer
There has been encouraging progress on information flow control for programs in
increasingly complex programming languages, tracking the propagation of information from …

Compositional information flow monitoring for reactive programs

MK McCall, A Bichhawat, L Jia - 2022 IEEE 7th European …, 2022 - ieeexplore.ieee.org
To prevent applications from leaking users' private data to attackers, researchers have
developed runtime information flow control (IFC) mechanisms. Most existing approaches are …

WebPol: Fine-grained information flow policies for web browsers

A Bichhawat, V Rajani, J Jain, D Garg… - European Symposium on …, 2017 - Springer
In the standard web browser programming model, third-party scripts included in an
application execute with the same privilege as the application's own code. This leaves the …