You are what you include: large-scale evaluation of remote javascript inclusions

N Nikiforakis, L Invernizzi, A Kapravelos… - Proceedings of the …, 2012 - dl.acm.org
JavaScript is used by web developers to enhance the interactivity of their sites, offload work
to the users' browsers and improve their sites' responsiveness and user-friendliness, making …

Online privacy management

JC Goodwin, JR Manion - US Patent 9,003,552, 2015 - Google Patents
(63) Continuation-in-part of application No. 13/554,603, Assistant Evominer Shanto
MAbedin filedon Jul. 20, 2012, now Pat No. 8,516,601, which is (74) Attorney, Agent, or Firm …

A perspective on information-flow control

D Hedin, A Sabelfeld - Software safety and security, 2012 - ebooks.iospress.nl
Abstract Information-flow control tracks how information propagates through the program
during execution to make sure that the program handles the information securely. Secure …

JSand: complete client-side sandboxing of third-party JavaScript without browser modifications

P Agten, S Van Acker, Y Brondsema… - Proceedings of the 28th …, 2012 - dl.acm.org
The inclusion of third-party scripts in web pages is a common practice. A recent study has
shown that more than half of the Alexa top 10000 sites include scripts from more than 5 …

SpringerBriefs in Computer Science

S Zdonik, P Ning, S Shekhar, J Katz, X Wu, LC Jain… - 2012 - Springer
This is an introduction to multicast routing, which is the study of methods for routing from one
source to many destinations, or from many sources to many destinations. Multicast is …

MyWebGuard: toward a user-oriented tool for security and privacy protection on the web

PN Hiremath, J Armentrout, S Vu, TN Nguyen… - Future Data and Security …, 2019 - Springer
We introduce a novel approach to implementing a browser-based tool for web users to
protect their privacy. We propose to monitor the behaviors of JavaScript code within a …

{ADsafety}:{Type-Based} Verification of {JavaScript} Sandboxing

JG Politz, SA Eliopoulos, A Guha… - 20th USENIX Security …, 2011 - usenix.org
Web sites routinely incorporate JavaScript programs from several sources into a single
page. These sources must be protected from one another, which requires robust …

Gradual typing embedded securely in JavaScript

N Swamy, C Fournet, A Rastogi, K Bhargavan… - ACM SIGPLAN …, 2014 - dl.acm.org
JavaScript's flexible semantics makes writing correct code hard and writing secure code
extremely difficult. To address the former problem, various forms of gradual typing have …

Inlined information flow monitoring for JavaScript

A Chudnov, DA Naumann - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Extant security mechanisms for web apps, notably the" same-origin policy", are not sufficient
to achieve confidentiality and integrity goals for the many apps that manipulate sensitive …

WebJail: least-privilege integration of third-party components in web mashups

S Van Acker, P De Ryck, L Desmet, F Piessens… - Proceedings of the 27th …, 2011 - dl.acm.org
In the last decade, the Internet landscape has transformed from a mostly static world into
Web 2.0, where the use of web applications and mashups has become a daily routine for …