Inlined information flow monitoring for JavaScript
A Chudnov, DA Naumann - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Extant security mechanisms for web apps, notably the" same-origin policy", are not sufficient
to achieve confidentiality and integrity goals for the many apps that manipulate sensitive …
to achieve confidentiality and integrity goals for the many apps that manipulate sensitive …
[HTML][HTML] Formal methods for web security
In the last few years, many security researchers proposed to endow the web platform with
more rigorous foundations, thus allowing for a precise reasoning on web security issues …
more rigorous foundations, thus allowing for a precise reasoning on web security issues …
{WPSE}: Fortifying Web Protocols via {Browser-Side} Security Monitoring
We present WPSE, a browser-side security monitor for web protocols designed to ensure
compliance with the intended protocol flow, as well as confidentiality and integrity properties …
compliance with the intended protocol flow, as well as confidentiality and integrity properties …
Multiple facets for dynamic information flow with exceptions
TH Austin, T Schmitz, C Flanagan - ACM Transactions on Programming …, 2017 - dl.acm.org
JavaScript is the source of many security problems, including cross-site scripting attacks and
malicious advertising code. Central to these problems is the fact that code from untrusted …
malicious advertising code. Central to these problems is the fact that code from untrusted …
SoK: All or nothing-a postmortem of solutions to the third-party script inclusion permission model and a path forward
S Sprecher, C Kerschbaumer… - 2022 IEEE 7th European …, 2022 - ieeexplore.ieee.org
The web execution model allows third-party JavaScript to be leveraged in a single execution
context. Access control for these scripts is currently all or nothing. It has been this way for …
context. Access control for these scripts is currently all or nothing. It has been this way for …
Tainted Secure Multi-Execution to Restrict Attacker Influence
Attackers can steal sensitive user information from web pages via third-party scripts. Prior
work shows that secure multi-execution (SME) with declassification is useful for mitigating …
work shows that secure multi-execution (SME) with declassification is useful for mitigating …
Fine-Grained Data-Centric Content Protection Policy for Web Applications
The vast amount of sensitive data in modern web applications has become a prime target for
cyberattacks. Existing browser security policies disallow the execution of unknown scripts …
cyberattacks. Existing browser security policies disallow the execution of unknown scripts …
A principled approach to tracking information flow in the presence of libraries
There has been encouraging progress on information flow control for programs in
increasingly complex programming languages, tracking the propagation of information from …
increasingly complex programming languages, tracking the propagation of information from …
Compositional information flow monitoring for reactive programs
To prevent applications from leaking users' private data to attackers, researchers have
developed runtime information flow control (IFC) mechanisms. Most existing approaches are …
developed runtime information flow control (IFC) mechanisms. Most existing approaches are …
WebPol: Fine-grained information flow policies for web browsers
In the standard web browser programming model, third-party scripts included in an
application execute with the same privilege as the application's own code. This leaves the …
application execute with the same privilege as the application's own code. This leaves the …