Proceedings of the 17th ACM Conference on Computer and Communications Security 2010
DOI: 10.1145/1866307.1866339
|View full text |Cite
|
Sign up to set email alerts
|

An empirical study of privacy-violating information flows in JavaScript web applications

Abstract: The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such flows on a large number of popular websites. We have (1) designed an expressive, fine-grained information flow policy language that allows us to specify and detect different kinds of privacy-violating flows in JavaScript code, (2) implemented a new rewriting-based JavaScript information flow engine within the Chrome browser, and (3) … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
100
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 131 publications
(103 citation statements)
references
References 23 publications
(31 reference statements)
1
100
0
Order By: Relevance
“…Scripts can leak session identifiers [44], inject requests into an ongoing session [9], sniff the user's browsing history, or track the user's behavior on a web site [29]. Such malicious scripts can enter a web page because of a cross-site scripting vulnerability [31], or because the page integrates third party scripts such as advertisements, or gadgets.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Scripts can leak session identifiers [44], inject requests into an ongoing session [9], sniff the user's browsing history, or track the user's behavior on a web site [29]. Such malicious scripts can enter a web page because of a cross-site scripting vulnerability [31], or because the page integrates third party scripts such as advertisements, or gadgets.…”
Section: Introductionmentioning
confidence: 99%
“…Several researchers [14,40] have proposed information flow control as a general and powerful security enforcement mechanism that can address many of these attacks, and hence reduce the need for ad-hoc or The adaptation of the Style API is an example of an ad-hoc countermeasure specifically developed to mitigate the history sniffing threat [8], but most of the privacy leaks described by Jang et al [29] are not yet countered in modern browsers.…”
Section: Introductionmentioning
confidence: 99%
“…However, once third-party code is included in a web page, it is executed with the same privileges as the code that uses the libraries. This gives rise to a number of attack possibilities that include location hijacking, behavioral tracking, leaking cookies, and sniffing browsing history [21]. Security policy stakeholders An additional complication is that the different stakeholders have different interests in the security policies to be enforced in web applications.…”
Section: Introductionmentioning
confidence: 99%
“…Our focus on information flow is justified by the nature of the JavaScript attacks from the empirical studies [21,32] that demonstrate the current security practices fail to prevent such attacks as location hijacking, behavioral tracking, leaking cookies, and sniffing browsing history. Jang et al [21] report on both explicit and implicit flows exploited in the empirical studies.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation