Proceedings of the 29th Annual ACM Symposium on Applied Computing 2014
DOI: 10.1145/2554850.2554909
|View full text |Cite
|
Sign up to set email alerts
|

JSFlow

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 116 publications
(14 citation statements)
references
References 29 publications
0
14
0
Order By: Relevance
“…This section presents practical experiments made by instantiating the deployment architectures with the JSFlow [19,18] information-flow monitor. JSFlow is a tool that extends the formalization of a dynamic information flow tracker [20] to the full JavaScript language and its APIs.…”
Section: Instantiationmentioning
confidence: 99%
See 1 more Smart Citation
“…This section presents practical experiments made by instantiating the deployment architectures with the JSFlow [19,18] information-flow monitor. JSFlow is a tool that extends the formalization of a dynamic information flow tracker [20] to the full JavaScript language and its APIs.…”
Section: Instantiationmentioning
confidence: 99%
“…Our instantiation shows how to deploy JSFlow [19,18], an information-flow monitor for JavaScript by Hedin et al, via browser extension, via web proxy, and via suffix proxy (web service). We report on security and performance experiments that illustrate successful deployment of a JavaScript information-flow monitor with the different architectures.…”
Section: Introductionmentioning
confidence: 99%
“…This has resulted in tools for mainstream programming languages as FlowFox [16] and JSFlow [20] for JavaScript, Jif [26], Paragon [9] and JOANA [17] for Java, FlowCaml [30] for Caml, LIO [31] for Haskell, and SPARK Examiner [5] for Ada that enforce versatile security policies. However, a roadblock on the way to wider adoption of these tools has been their limited permissiveness i.e secure programs are falsely rejected due to over-approximations.…”
Section: Introductionmentioning
confidence: 99%
“…However, a roadblock on the way to wider adoption of these tools has been their limited permissiveness i.e secure programs are falsely rejected due to over-approximations. Flow-, context-, and object-sensitive techniques [17] have been suggested to improve the precision of static information flow control, and dynamic and hybrid monitors [22,32,27,20,19] have been explored to leverage the knowledge about the current run for precision. Dynamic and hybrid techniques are particularly promising for highly dynamic languages such as JavaScript.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation