Javascript zero: Real javascript and zero side-channel attacks

M Schwarz, M Lipp, D Gruss - Network and Distributed …, 2018 - graz.elsevierpure.com
Modern web browsers are ubiquitously used by billions of users, connecting them to the
world wide web. From the other side, web browsers do not only provide a unified interface …

User-controlled privacy: taint, track, and control

F Hublet, D Basin, S Krstić - Proceedings on Privacy Enhancing …, 2024 - petsymposium.org
We develop the first language-based, Privacy by Design approach that provides support for
a rich class of privacy policies. The policies are user-defined, rather than programmer …

An empirical study of information flows in real-world javascript

CA Staicu, D Schoepe, M Balliu, M Pradel… - Proceedings of the 14th …, 2019 - dl.acm.org
Information flow analysis prevents secret or untrusted data from flowing into public or trusted
sinks. Existing mechanisms cover a wide array of options, ranging from lightweight taint …

Tainted Secure Multi-Execution to Restrict Attacker Influence

MK McCall, A Bichhawat, L Jia - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Attackers can steal sensitive user information from web pages via third-party scripts. Prior
work shows that secure multi-execution (SME) with declassification is useful for mitigating …

Compositional information flow monitoring for reactive programs

MK McCall, A Bichhawat, L Jia - 2022 IEEE 7th European …, 2022 - ieeexplore.ieee.org
To prevent applications from leaking users' private data to attackers, researchers have
developed runtime information flow control (IFC) mechanisms. Most existing approaches are …

Brigadier: A Datalog-based IAST framework for Node. js Applications

ALS Pupo, J Nicolay, EG Boix - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The NODE. JS runtime, in combination with Node Package Manager (NPM), is a popular
ecosystem for building server-side web applications. Both JavaScript's flexible and dynamic …

Knowledge-based security of dynamic secrets for reactive programs

MK McCall, H Zhang, L Jia - 2018 IEEE 31st Computer Security …, 2018 - ieeexplore.ieee.org
Scripts on webpages could steal sensitive user data. Much work has been done, both in
modeling and implementation, to enforce information flow control (IFC) of webpages to …

Information Flow Control for Dynamic Reactive Systems

MK McCall - 2023 - search.proquest.com
It is common for reactive systems like web services to collect personal information and/or
perform sensitive tasks, making information flow control (IFC) in these applications …

Restricting Attacker Influence in Reactive Programs with Dynamic Secrets

MK McCall, A Bichhawat, L Jia - kilthub.cmu.edu
Prior work has established that the attacker should not be allowed to influence what is
declassified or when declassification occurs. Meanwhile, other work looks at protecting …

[图书][B] Flexible information-flow control

D Schoepe - 2018 - search.proquest.com
As more and more sensitive data is handled by software, its trustworthiness becomes an
increasingly important concern. This thesis presents work on ensuring that information …