Corpus ID: 2021792

ADsafety: Type-Based Verification of JavaScript Sandboxing

@article{Politz2011ADsafetyTV,
  title={ADsafety: Type-Based Verification of JavaScript Sandboxing},
  author={Joe Gibbs Politz and Spiridon Aristides Eliopoulos and Arjun Guha and Shriram Krishnamurthi},
  journal={ArXiv},
  year={2011},
  volume={abs/1506.07813}
}
Web sites routinely incorporate JavaScript programs from several sources into a single page. These sources must be protected from one another, which requires robust sandboxing. The many entry-points of sandboxes and the subtleties of JavaScript demand robust verification of the actual sandbox source. We use a novel type system for JavaScript to encode and verify sandboxing properties. The resulting verifier is lightweight and efficient, and operates on actual source. We demonstrate the… Expand
Typed-based verification of Web sandboxes
TLDR
This article presents a type-based approach to verifying Web sandboxes, using a JavaScript type-checker to encode and verify sandboxing properties, and demonstrates it by applying it to the ADsafe Web sandbox, providing a proof of ADsafe's safety. Expand
SafeJS: Hermetic Sandboxing for JavaScript
TLDR
This article presents SafeJS, an approach and implementation that offers isolation based on separate sandboxes and control of information exchanged between them that is currently being used in an industrial setting in the context of the Resilience FUI 12 project. Expand
JavaScript Sandboxing: Isolating and Restricting Client-Side JavaScript
Today's web applications rely on the same-origin policy, the primary security policy of the Web, to isolate their web origin from malicious client-side JavaScript. When an attacker can somehowExpand
Analysis of JavaScript Programs
TLDR
This article classify the client-side JavaScript research for the last decade or so into six topics: static analysis, dynamic analysis, formalization and reasoning, type safety and JIT optimization, security for web applications, and empirical studies. Expand
Inlined Information Flow Monitoring for JavaScript
TLDR
An inlined IFC monitor for ECMAScript 5 with web support is presented, using the no-sensitive-upgrade (NSU) technique, together with experimental evaluation using synthetic mashups and performance benchmarks. Expand
Transaction-based Sandboxing for JavaScript
TLDR
DecentJS is presented, a language-embedded sandbox for full JavaScript that enables scripts to run in a configurable degree of isolation with fine-grained access control and provides a transactional scope in which effects are logged for review by the access control policy. Expand
A two-tier sandbox architecture for untrusted JavaScript
TLDR
A two-tier sandbox architecture to enable a website owner to enforce modular fine-grained security policies for potential untrusted third-party JavaScript code, which improves upon the state-of-the-art as it does not depend on browser modification nor preprocessing or transformation ofUntrusted code, and allows the secure enforcement of fine- grained, stateful access control policies. Expand
Treehouse: Javascript Sandboxes to Help Web Developers Help Themselves
TLDR
The approach, called TreeHouse, sandboxes JavaScript code by repurposing a feature of current browsers (namely Web Workers) and virtualizes the browser's API to the sandboxed code and gives the application author fine-grained control over that code. Expand
JSand: complete client-side sandboxing of third-party JavaScript without browser modifications
TLDR
JSand, a server-driven but client-side JavaScript sandboxing framework, is proposed, and it is shown that it is secure, backwards compatible, and that it performs sufficiently well. Expand
Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content
TLDR
This article presents FlashJaX, a cross-platform solution that enforces fine-grained, history-based policies that span both Flash and JavaScript, and safely embeds untrusted JavaScript and Flash content in Web pages without modifying browser clients or using special plug-ins. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 45 REFERENCES
Run-Time Enforcement of Secure JavaScript Subsets
Many Web-based applications such as advertisement, social networking and online shopping benefit from the interaction of trusted and unstrusted content within the same page. If the untrusted contentExpand
Preventing Capability Leaks in Secure JavaScript Subsets
TLDR
It is shown that onethird of the Alexa US Top 100 web sites would be exploitable by an ADsafe-verified advertisement and an improved statically verified JavaScript subset that whitelists known-safe properties using namespaces is proposed. Expand
Safe Wrappers and Sane Policies for Self Protecting JavaScript
TLDR
This paper addresses issues to provide a systematic way to avoid the identified vulnerabilities, and make it easier for the policy writer to construct declarative policies --- i.e. policies upon which attacker code has no side effects. Expand
Isolating JavaScript with Filters, Rewriting, and Wrappers
TLDR
Using a formal semantics for the ECMA 262-3 standard language, it is proved security properties of a subset of JavaScript, comparable in expressiveness to Facebook FBJS, are obtained by combining three isolation mechanisms. Expand
JavaScript instrumentation for browser security
TLDR
A useful by-product of this work is an operational semantics of a core subset of JavaScript, where code embedded in (HTML) documents may generate further document pieces at runtime, yielding a form of self-modifying code. Expand
ADSandbox: sandboxing JavaScript to fight malicious websites
TLDR
ADSandbox is presented, an analysis system for malicious websites that focusses on detecting attacks through JavaScript, which combines generality with usability, since the system is executed directly on the client running the web browser before the web page is displayed. Expand
Automated Analysis of Security-Critical JavaScript APIs
TLDR
This work defines the semantics of a restricted version of JavaScript devised by the ECMA Standards committee for isolation purposes, and develops and test an automated tool that can soundly establish that a given API cannot be circumvented or subverted, and reveals a previously-undiscovered vulnerability in the Yahoo! AD Safe filter. Expand
Featherweight Firefox: Formalizing the Core of a Web Browser
TLDR
The specification accurately models the asynchronous nature of web browsers and covers the basic aspects of windows, DOM trees, cookies, HTTP requests and responses, user input, and a minimal scripting language with first-class functions, dynamic evaluation, and AJAX requests. Expand
ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser
TLDR
ConScript, a client-side advice implementation for security, built on top of Internet Explorer 8, is presented and it is concluded that it is significantly lower than that of other systems proposed in the literature, both on micro-benchmarks as well as large, widely-used applications such as MSN, GMail, Google Maps, and Live Desktop. Expand
Lightweight self-protecting JavaScript
TLDR
The proposed method to control JavaScript execution is lightweight in that it does not require a modified browser, and the lack of need for browser modifications means that the policy can be applied on the server to mitigate some effects of cross-site scripting bugs. Expand
...
1
2
3
4
5
...