Proceedings of the 10th European Workshop on Systems Security 2017
DOI: 10.1145/3065913.3065917
|View full text |Cite
|
Sign up to set email alerts
|

TrustJS

Abstract: Client-side JavaScript has become ubiquitous in web applications to improve user experience and reduce server load. However, since clients are untrusted, servers cannot rely on the confidentiality or integrity of client-side JavaScript code and the data that it operates on. For example, client-side input validation must be repeated at server side, and confidential business logic cannot be offloaded. In this paper, we present TRUSTJS, a framework that enables trustworthy execution of security-sensitive JavaScri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…Controlled-channel attacks [61] can leak the secret data. We analysed these attacks against the other frameworks [17,20] executing private algorithms client-side in Section 4.…”
Section: Research Directionmentioning
confidence: 99%
See 1 more Smart Citation
“…Controlled-channel attacks [61] can leak the secret data. We analysed these attacks against the other frameworks [17,20] executing private algorithms client-side in Section 4.…”
Section: Research Directionmentioning
confidence: 99%
“…Both TrustJS [20] and SecureJS [17] frameworks enable a dynamic load of JS code at runtime. These frameworks use the first method described in Section 3.5.…”
Section: Case Study: Leaks On Framework Enabling Confidential Code Ementioning
confidence: 99%
“…TrustJs is a framework for trustworthy execution of security-sensitive JavaScript code inside commodity browsers [168]. It leverages enclaves to protect the client-side execution of JavaScript, enabling a flexible partitioning of web application code.…”
Section: Web and Sgxmentioning
confidence: 99%
“…doing so, general user machines-which are more vulnerable to generic malwares and simpler infection vectors like social engineering-may be regarded as trusted. This brings new possibilities like server processing offloading [168], network monitoring [241] or trusted decentralised P2P networks, as we propose here.…”
Section: Tee In the Client-sidementioning
confidence: 99%