Supply-chain vulnerability elimination via active learning and regeneration

N Vasilakis, A Benetopoulos, S Handa… - Proceedings of the …, 2021 - dl.acm.org
Software supply-chain attacks target components that are integrated into client applications.
Such attacks often target widely-used components, with the attack taking place via …

Preventing dynamic library compromise on node. js via rwx-based privilege reduction

N Vasilakis, CA Staicu, G Ntousakis, K Kallas… - Proceedings of the …, 2021 - dl.acm.org
Third-party libraries ease the development of large-scale software systems. However,
libraries often execute with significantly more privilege than needed to complete their task …

[PDF][PDF] xBook: Redesigning Privacy Control in Social Networking Platforms.

K Singh, S Bhola, W Lee - USENIX Security Symposium, 2009 - usenix.org
Social networking websites have recently evolved from being service providers to platforms
for running third party applications. Users have typically trusted the social networking sites …

Intrusion recovery for database-backed web applications

R Chandra, T Kim, M Shah, N Narula… - Proceedings of the …, 2011 - dl.acm.org
Warp is a system that helps users and administrators of web applications recover from
intrusions such as SQL injection, cross-site scripting, and clickjacking attacks, while …

IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM

M Heiderich, T Frosch, T Holz - … Symposium, RAID 2011, Menlo Park, CA …, 2011 - Springer
Due to its flexibility and dynamic character, JavaScript has become an important tool for
attackers. The widespread scripting language often helps them to perform a broad variety of …

Privacy-preserving browser-side scripting with BFlow

A Yip, N Narula, M Krohn, R Morris - Proceedings of the 4th ACM …, 2009 - dl.acm.org
Some web sites provide interactive extensions using browser scripts, often without
inspecting the scripts to verify that they are benign and bug-free. Others handle users' …

A Server‐Side JavaScript Security Architecture for Secure Integration of Third‐Party Libraries

N Van Ginkel, W De Groef, F Massacci… - Security and …, 2019 - Wiley Online Library
The popularity of the JavaScript programming language for server‐side programming has
increased tremendously over the past decade. The Node. js framework is a popular …

Extensible access control with authorization contracts

S Moore, C Dimoulas, RB Findler, M Flatt… - ACM SIGPLAN …, 2016 - dl.acm.org
Existing programming language access control frameworks do not meet the needs of all
software components. We propose an expressive framework for implementing access …

JSSignature: eliminating third-party-hosted JavaScript infection threats using digital signatures

K Nakhaei, F Ansari, E Ansari - SN Applied Sciences, 2020 - Springer
Today, third-party JavaScript resources are an indispensable part of the web platform. More
than 88% of the world's top websites include at least one JavaScript resource from a remote …

Hails: Protecting data privacy in untrusted web applications

D Giffin, A Levy, D Stefan, D Terei… - Journal of …, 2017 - content.iospress.com
Many modern web-platforms are no longer written by a single entity, such as a company or
individual, but consist of a trusted core that can be extended by untrusted third-party authors …