JavaScript instrumentation for browser security

Author:

Yu Dachuan1,Chander Ajay1,Islam Nayeem1,Serikov Igor1

Affiliation:

1. DoCoMo Communications Laboratories USA, Inc.

Abstract

It is well recognized that JavaScript can be exploited to launch browser-based security attacks. We propose to battle such attacks using program instrumentation. Untrusted JavaScript code goes through a rewriting process which identifies relevant operations, modifies questionable behaviors, and prompts the user (a web page viewer) for decisions on how to proceed when appropriate. Our solution is parametric with respect to the security policy-the policy is implemented separately from the rewriting, and the same rewriting process is carried out regardless of which policy is in use. Be-sides providing a rigorous account of the correctness of our solution, we also discuss practical issues including policy management and prototype experiments. A useful by-product of our work is an operational semantics of a core subset of JavaScript, where code embedded in (HTML) documents may generate further document pieces (with new code embedded) at runtime, yielding a form of self-modifying code.

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Graphics and Computer-Aided Design,Software

Reference24 articles.

1. Towards Type Inference for JavaScript

2. Composing security policies with polymer

3. ECMA International. ECMAScript language specification. Stardard ECMA-262 3rd Edition http://www.ecma-international.org/publications/files/ECMA ST/Ecma-262.pdf Dec. 1999. ECMA International. ECMAScript language specification. Stardard ECMA-262 3rd Edition http://www.ecma-international.org/publications/files/ECMA ST/Ecma-262.pdf Dec. 1999.

4. SASI enforcement of security policies

Cited by 31 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Survey on Defense Technology of Web Application Based on Interpretive Dynamic Programming Languages;2022 7th International Conference on Computer and Communication Systems (ICCCS);2022-04-22

2. Finding client-side business flow tampering vulnerabilities;Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering;2020-06-27

3. Towards the Efficient Use of Dynamic Call Graph Generators of Node.js Applications;Communications in Computer and Information Science;2020

4. Evaluation and Comparison of Dynamic Call Graph Generators for JavaScript;Proceedings of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering;2019

5. A Survey of Dynamic Analysis and Test Generation for JavaScript;ACM Computing Surveys;2018-09-30

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3