2009 22nd IEEE Computer Security Foundations Symposium 2009
DOI: 10.1109/csf.2009.11
|View full text |Cite
|
Sign up to set email alerts
|

Language-Based Isolation of Untrusted JavaScript

Abstract: Web sites that incorporate untrusted content may use browser-or language-based methods to keep such content from maliciously altering pages, stealing sensitive information, or causing other harm. We study language-based methods for filtering and rewriting JavaScript code, using Yahoo! ADSafe and Facebook FBJS as motivating examples. We explain the core problems by describing previously unknown vulnerabilities and subtleties, and develop a foundation for improved solutions based on an operational semantics of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
57
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 65 publications
(57 citation statements)
references
References 11 publications
0
57
0
Order By: Relevance
“…Our approach can be applied to other scenarios, such as the verification of isolation properties [9], where it could be used to derive mostly-static lightweight enforcement mechanisms from prior purely static specifications.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Our approach can be applied to other scenarios, such as the verification of isolation properties [9], where it could be used to derive mostly-static lightweight enforcement mechanisms from prior purely static specifications.…”
Section: Discussionmentioning
confidence: 99%
“…In JavaScript, one can access a field f of an object o either by writing o.f or o [e], where e is an expression that dynamically evaluates to the string f. Dynamic computation of field names is one of the major sources of imprecision of static analyses for JavaScript [9].…”
Section: Introductionmentioning
confidence: 99%
“…Until recently, such content-rewriting was a dangerous proposition. In particular, Google [28], Yahoo [11], Facebook [13], and Microsoft [16] have all developed technology to constrain the effects of thirdparty web content such as advertisements; but the design of existing browser interfaces made those tools vulnerable to attack [26].…”
Section: Discussion and Limitationsmentioning
confidence: 99%
“…Monitored code can attempt to replace the transformation function with, e.g., the identity function, i.e., this['trans'] = function(s){ return s }. We envisage a combination of our monitor with safe language subset and reference monitoring technology [27,7,11,22,21] to prevent operations that compromise the integrity of the monitor.…”
Section: Methodsmentioning
confidence: 99%