2007
DOI: 10.1145/1190215.1190252
|View full text |Cite
|
Sign up to set email alerts
|

JavaScript instrumentation for browser security

Abstract: It is well recognized that JavaScript can be exploited to launch browser-based security attacks. We propose to battle such attacks using program instrumentation. Untrusted JavaScript code goes through a rewriting process which identifies relevant operations, modifies questionable behaviors, and prompts the user (a web page viewer) for decisions on how to proceed when appropriate. Our solution is parametric with respect to the security policy-the policy is implemented separately from the rewriting, and the same… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
77
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 76 publications
(77 citation statements)
references
References 14 publications
0
77
0
Order By: Relevance
“…Yu et al [44] and Kikuchi et al [24] present an instrumentation approach for JavaScript in the browser. Their framework allows instrumented code to encode edit automata-based policies.…”
Section: Related Workmentioning
confidence: 99%
“…Yu et al [44] and Kikuchi et al [24] present an instrumentation approach for JavaScript in the browser. Their framework allows instrumented code to encode edit automata-based policies.…”
Section: Related Workmentioning
confidence: 99%
“…As for JavaScript several techniques have been proposed (Nentwich et al, 2007;Yu et al, 2007;Jim et al, 2007;Dhawan and Ganapathy, 2009;Chudnov and Naumann, 2010;Jang et al, 2010) such as solutions based on client-side or server-side to prevent history sniffing, disable unknown scripts, signed scripts, program instrumentation and dynamic taint propagation and checking. Some of these solutions can be implemented in proxies and other requires the modification of Web browser source code.…”
Section: Privacy Solutions For Application Layermentioning
confidence: 99%
“…By inserting and suppressing actions, edit automata capture the practical ability of runtime mechanisms to transform invalid executions into valid executions, rather than the ability of truncation automata to only recognize and halt invalid executions. Edit automata have served as the basis for additional studies of runtime enforcement (e.g., [18,16,4]). …”
Section: Related Workmentioning
confidence: 99%