2014
DOI: 10.1007/978-3-319-04897-0_10
|View full text |Cite
|
Sign up to set email alerts
|

Architectures for Inlining Security Monitors in Web Applications

Abstract: Abstract. Securing JavaScript in the browser is an open and challenging problem. Code from pervasive third-party JavaScript libraries exacerbates the problem because it is executed with the same privileges as the code that uses the libraries. An additional complication is that the different stakeholders have different interests in the security policies to be enforced in web applications. This paper focuses on securing JavaScript code by inlining security checks in the code before it is executed. We achieve gre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 11 publications
(14 citation statements)
references
References 34 publications
0
14
0
Order By: Relevance
“…For example, a suffix proxy for domain suffix.org could offer the services of google.com transparently over domain google.com.suffix.org. A suffix proxy can observe and modify complete web requests and responses for monitoring purposes, and a use case is JavaScript code instrumentation for adding security controls [115]. Furthermore, a suffix proxy can access encrypted HTTPS communication when SSL/TLS client authentication is not performed.…”
Section: Middleware Layermentioning
confidence: 99%
See 3 more Smart Citations
“…For example, a suffix proxy for domain suffix.org could offer the services of google.com transparently over domain google.com.suffix.org. A suffix proxy can observe and modify complete web requests and responses for monitoring purposes, and a use case is JavaScript code instrumentation for adding security controls [115]. Furthermore, a suffix proxy can access encrypted HTTPS communication when SSL/TLS client authentication is not performed.…”
Section: Middleware Layermentioning
confidence: 99%
“…Today's SaaS delivery models often rely on web technology, and web mashups are a popular approach to achieve composition and JavaScript code reuse [57,174]. An example for an integration-driven monitoring in mashups is to instrument untrusted third-party JavaScript code [115].…”
Section: Middleware Layermentioning
confidence: 99%
See 2 more Smart Citations
“…Our research is focused on providing a client-centric identity meta-system which allows a client to maintain a private identity directory while offering individual users automatic authentication to cloud-based services via a single sign-on, privacyenhanced service. In the paper [115], we have introduced the concept of an identity management machine (IdMM), an ASM-based, client-centric, single sign-on tool for small and medium enterprises that want to adopt or migrate to cloud-based services. This concept has been further refined in the paper [116] where we described the architecture of the IdMM.…”
Section: Client-centric Identity and Access Management In Cloud Compumentioning
confidence: 99%