2013
DOI: 10.1145/2578856.2508176
|View full text |Cite
|
Sign up to set email alerts
|

Efficient dynamic access analysis using JavaScript proxies

Abstract: JSConTest introduced the notions of effect monitoring and dynamic effect inference for JavaScript. It enables the description of effects with path specifications resembling regular expressions. It is implemented by an offline source code transformation. To overcome the limitations of the JSConTest implementation, we redesigned and reimplemented effect monitoring by taking advantange of JavaScript proxies. Our new design avoids all drawbacks of the prior implementation. It guarantees full interpositio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 5 publications
(13 citation statements)
references
References 41 publications
0
13
0
Order By: Relevance
“…Recent research [7] explores the addition of such a feature to existing languages, and contract systems have been implemented using membrane-like constructs [19,31]. In addition, membranes have been used to equip Javascript objects with contracts for path-based access control for method invocation [32].…”
Section: B Implementing Capability Controlmentioning
confidence: 99%
“…Recent research [7] explores the addition of such a feature to existing languages, and contract systems have been implemented using membrane-like constructs [19,31]. In addition, membranes have been used to equip Javascript objects with contracts for path-based access control for method invocation [32].…”
Section: B Implementing Capability Controlmentioning
confidence: 99%
“…Proxies implement contracts in Racket [6] and in JavaScript [3,5]. Contracts impose restrictions that the programmer regards as preconditions for the correct execution of a program.…”
Section: Use Case: Contractsmentioning
confidence: 99%
“…This approach preserves the previous behavior and retains the possibility to distinguish proxies from target objects in library code implementing proxy abstractions. However, it would require the application code to be transformed (at run time to support eval), which is not feasible in an application like access control [5] that must work with unmodified foreign code.…”
Section: Alternative Designsmentioning
confidence: 99%
See 2 more Smart Citations