How the Web Tangled Itself: Uncovering the History of {Client-Side} Web ({In) Security}

B Stock, M Johns, M Steffens, M Backes - 26th USENIX Security …, 2017 - usenix.org
While in its early days, the Web was mostly static, it has organically grown into a full-fledged
technology stack. This evolution has not followed a security blueprint, resulting in many …

[PDF][PDF] The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites.

S Son, V Shmatikov - NDSS, 2013 - cs.utexas.edu
The postMessage mechanism in HTML5 enables Web content from different origins to
communicate with each other, thus relaxing the same origin policy. It is especially popular in …

Juggling the jigsaw: Towards automated problem inference from network trouble tickets

R Potharaju, N Jain, C Nita-Rotaru - 10th USENIX symposium on …, 2013 - usenix.org
This paper presents NetSieve, a system that aims to do automated problem inference from
network trouble tickets. Network trouble tickets are diaries comprising fixed fields and free …

Establishing browser security guarantees through formal shim verification

D Jang, Z Tatlock, S Lerner - 21st USENIX Security Symposium …, 2012 - usenix.org
Web browsers mediate access to valuable private data in domains ranging from health care
to banking. Despite this critical role, attackers routinely exploit browser vulnerabilities to …

The Unexpected Dangers of Dynamic {JavaScript}

S Lekies, B Stock, M Wentzel, M Johns - 24th USENIX Security …, 2015 - usenix.org
Modern Web sites frequently generate JavaScript on-the-fly via server-side scripting,
incorporating personalized user data in the process. In general, cross-domain access to …

[HTML][HTML] Embassies: Radically refactoring the web

J Howell, B Parno, JR Douceur, M Dahlin… - … USENIX Symposium on …, 2013 - usenix.org
Managing a network requires support for multiple concurrent tasks, from routing and traffic
monitoring, to access control and server load balancing. Software-Defined Networking …

FlashOver: Automated discovery of cross-site scripting vulnerabilities in rich internet applications

S Van Acker, N Nikiforakis, L Desmet… - Proceedings of the 7th …, 2012 - dl.acm.org
The last fifteen years have transformed the Web in ways that would seem unimaginable to
anyone of the" few" Internet users of the year 1995 [8]. What began as a simple set of …

How to Run {POSIX} Apps in a Minimal Picoprocess

J Howell, B Parno, JR Douceur - 2013 USENIX Annual Technical …, 2013 - usenix.org
We envision a future where Web, mobile, and desktop applications are delivered as
isolated, complete software stacks to a minimal, secure client host. This shift imbues app …

Between worlds: Securing mixed JavaScript/ActionScript multi-party web content

PH Phung, M Monshizadeh, M Sridhar… - … on Dependable and …, 2014 - ieeexplore.ieee.org
Mixed Flash and JavaScript content has become increasingly prevalent; its purveyance of
dynamic features unique to each platform has popularized it for myriad web development …

[PDF][PDF] Self-exfiltration: The dangers of browser-enforced information flow control

EY Chen, S Gorbaty, A Singhal… - Proceedings of the …, 2012 - ieee-security.org
Since the early days of Netscape, browser vendors and web security researchers have
restricted out-going data based on its destination. The security argument accompanying …