Proceedings of the 1st Reversing and Offensive-Oriented Trends Symposium 2017
DOI: 10.1145/3150376.3150379
|View full text |Cite
|
Sign up to set email alerts
|

On The (In-)Security Of JavaScript Object Signing And Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
2
2
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 20 publications
0
13
0
Order By: Relevance
“…9 Another short-term mitigation would be enforcing a policy were unencrypted objects are not allowed to access encrypted content anymore -similar to "mixed content" warnings in the web, which are thrown by modern web browsers, for example, when JavaScript code from an insecure resource is to be executed on a secure website (see [7]). In the long term, the PDF 2.x specification should drop support for mixed content altogether 10 -the authors consider it to be a security nightmare. Instead, an encryption scheme should be preferred where the whole document -including its structure -is encrypted to leave no room for injection or wrapping attacks, and to minimize the overall attack surface significantly.…”
Section: Countermeasuresmentioning
confidence: 99%
See 2 more Smart Citations
“…9 Another short-term mitigation would be enforcing a policy were unencrypted objects are not allowed to access encrypted content anymore -similar to "mixed content" warnings in the web, which are thrown by modern web browsers, for example, when JavaScript code from an insecure resource is to be executed on a secure website (see [7]). In the long term, the PDF 2.x specification should drop support for mixed content altogether 10 -the authors consider it to be a security nightmare. Instead, an encryption scheme should be preferred where the whole document -including its structure -is encrypted to leave no room for injection or wrapping attacks, and to minimize the overall attack surface significantly.…”
Section: Countermeasuresmentioning
confidence: 99%
“…It should strictly prevent a PDF viewer from displaying manipulated content instead of simply showing a warning that 9 We analyzed a dataset of 8,840 encrypted PDF documents obtained from crawling the Alexa top 1 million websites and found only 353 to contain "partial encryption", all of them due to unencrypted metadata streams. 10 Note that there seems to be a trend towards the opposite direction and newer PDF specifications often added flexibility (e.g., "Unencrypted Wrappers" in PDF 2.0). users might just choose to ignore.…”
Section: Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…As sensor data pieces are collaborated, the trustworthiness of sensor collaborations is not just the matter of sensor devices or sensor data but, also, the trusted communications. In order to achieve the trustworthiness of sensor data communications, sensor data encryption over JSON has been discussed [26]. The format of data transmission in JSON is in dictionary, where pairs of key and values are listed [5].…”
Section: Jsonmentioning
confidence: 99%
“…As sensor data pieces are collaborated, the trustworthiness of sensor collaborations is not just the matter of sensor devises or sensor data but also the trusted communications. In order to achieve the trustworthiness of sensor data communications, sensor data encryption over JSON has been discussed [24]. The format of data transmission in JSON is in dictionary, where pairs of key and values are listed [2].…”
Section: Wireless Network Securitymentioning
confidence: 99%