2014
DOI: 10.3233/jcs-130495
|View full text |Cite
|
Sign up to set email alerts
|

Secure multi-execution of web scripts: Theory and practice

Abstract: Secure Multi-Execution (SME) is a precise and general information flow control mechanism that was claimed to be a good fit for implementing information flow security in browsers. We validate this claim by developing FlowFox, the first fully functional web browser that implements an information flow control mechanism for web scripts based on the technique of secure multi-execution. We provide evidence for the security of FlowFox by proving non-interference for a formal model of the essence of FlowFox, and by sh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
1
1

Relationship

3
3

Authors

Journals

citations
Cited by 12 publications
(20 citation statements)
references
References 42 publications
0
20
0
Order By: Relevance
“…Hence, the policy can record in its state which channels are open. However, this support for dynamic channels is not present in the formal model of FlowFox [13], and hence no formal guarantees are provided when using this feature.…”
Section: Related Workmentioning
confidence: 96%
“…Hence, the policy can record in its state which channels are open. However, this support for dynamic channels is not present in the formal model of FlowFox [13], and hence no formal guarantees are provided when using this feature.…”
Section: Related Workmentioning
confidence: 96%
“…Our prototype implementation is constructed as a modification of the FlowFox browser [12,13]. Crucial for our implementation is the ability to keep track of all sites a user is logged into and to make sure that the labelling of JavaScript API calls can be dependent on this login history.…”
Section: Methodsmentioning
confidence: 99%
“…Our work is directly based on existing information flow secure browsers that use the mechanism of secure multi-execution [16] for information flow control. The theoretical development is based on Bielova et al [6], whereas the implementation extends the FlowFox browser [12,13]. Alternative dynamic information flow control mechanisms for browser scripts are usually monitors.…”
Section: Information Flow Control For the Webmentioning
confidence: 99%
“…Bielova and Rezk [4] give a detailed survey and comparison of all kinds of dynamic information flow mechanisms, and we refer the reader to that paper for a detailed discussion. Both lines of work on dynamic information flow control (execution monitoring and multi-execution) have been applied to JavaScript in the browser [13,16], and both have dealt with the problem of interfacing with libraries in a relatively ad-hoc way -essentially by manual programming of models of the library functions, or by treating API calls as I/O operations [14]. Rajani et al [29] propose detailed and rigorous formal models of the DOM and event-handling parts of the browser, and find several potential information leaks.…”
Section: Examplesmentioning
confidence: 99%
“…Consider, for instance, the following example, that makes use of the standard JavaScript function Array.every which, given a predicate, returns true if every element in the array on which every is called, is in the extension of the predicate. In both JSFlow [17,16] and FlowFox [13,14], accurate modeling of many library functions, such as Array.every, requires hand-written, deep models. This is both labor-intensive and hard to maintain, not scaling to models for a rich set of libraries, as would be needed in a rich execution environment such as a browser or node.js [25,26,24].…”
Section: Introductionmentioning
confidence: 99%