Proceedings of the 34th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages 2007
DOI: 10.1145/1190216.1190252
|View full text |Cite
|
Sign up to set email alerts
|

JavaScript instrumentation for browser security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 93 publications
(29 citation statements)
references
References 14 publications
0
29
0
Order By: Relevance
“…It is not necessary to make customized modifications of web browsers as not all web browsers support user customization. Moreover, it is not necessary to enable script support in web browsers because such support introduces additional threats to users (Anupam and Mayer, 1998;Yu et al, 2007). Although using an external device enhances the security level, such devices are not mandatory.…”
Section: Related Workmentioning
confidence: 99%
“…It is not necessary to make customized modifications of web browsers as not all web browsers support user customization. Moreover, it is not necessary to enable script support in web browsers because such support introduces additional threats to users (Anupam and Mayer, 1998;Yu et al, 2007). Although using an external device enhances the security level, such devices are not mandatory.…”
Section: Related Workmentioning
confidence: 99%
“…IRMs were first formalized in the development of the PoET/PSLang/SASI systems [4,6], which instrument Java bytecode and Gnu assembly code. Subsequently, numerous IRM frameworks have been developed for Java [2,3,8,[10][11][12][13]23], JavaScript [17,19], .NET [7], AS [9,23], Android [20], and x86/64 native code [1,[14][15][16] architectures. Our experiments target SPoX-IRMs [23], which rewrite Java and AS bytecode programs to satisfy declarative, aspect-oriented security policies.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Runtime software monitoring via binary instrumentation (a.k.a., in-lined reference monitoring) has gained much attention in the literature as a powerful, flexible, and efficient approach to software security enforcement (e.g., [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20]). In-lined reference monitors (IRMs) dynamically enforce security policies by injecting security guards into untrusted binary code.…”
Section: Introductionmentioning
confidence: 99%
“…Chugh and coworkers [CMJL09] present (among others) a dynamic information flow analysis based on wholesale rewriting. Yu and coworkers [YCIS07] perform rewriting guided by a security policy. BrowserShield [RDW + 07] relies on similar techniques to attain safety.…”
Section: Related Workmentioning
confidence: 99%