Approaches for safe execution of JavaScript on web pages have been a topic of recent research interest. A significant number of these approaches aim to provide safety through runtime mediation of accesses made by a JavaScript program. In this paper, we propose a novel, lightweight JavaScript transformation technique for enforcing security properties on untrusted JavaScript programs using source code interposition. Our approach assures namespace isolation between several principals within a single web page, and access control for sensitive browser interfaces. This access control mechanism is based on a whitelist approach to ensure soundness of the mediation. Our technique is lightweight, resulting in low run-time overhead compared to existin...
We study methods that allow web sites to safely combine JavaScript from untrusted sources. If implem...
Isolating programs is an important mechanism to support more secure applica-tions. Isolating program...
Web applications are the most important gateway to the Internet. Billions of users are relying on th...
We present a method to intercept JavaScript built-in functions with security policies in order to co...
This paper introduces a method to control JavaScript execution. The aim is to prevent or modify inap...
Building secure web applications is notoriously difficult. The growing importance of JavaScript as a...
Modern Web applications combine and use JavaScript-based content from multiple untrusted sources. Wi...
It is well recognized that JavaScript can be exploited to launch browser-based security attacks. We ...
In today s web applications, no one disputes the important role of JavaScript asa client-side progra...
The large majority of websites nowadays embeds third-party JavaScript into their pages, coming from ...
Abstract—A typical Web 2.0 application usually includes JavaScript from various sources with differe...
Existing approaches to providing security for untrusted JavaScript include isolation of capabilities...
Modern web applications are conglomerations ofJavaScript written by multiple authors: application de...
International audienceProviding security guarantees for systems built out of untrusted components re...
Modern web applications are conglomerations of JavaScript written by multiple authors: application d...
We study methods that allow web sites to safely combine JavaScript from untrusted sources. If implem...
Isolating programs is an important mechanism to support more secure applica-tions. Isolating program...
Web applications are the most important gateway to the Internet. Billions of users are relying on th...
We present a method to intercept JavaScript built-in functions with security policies in order to co...
This paper introduces a method to control JavaScript execution. The aim is to prevent or modify inap...
Building secure web applications is notoriously difficult. The growing importance of JavaScript as a...
Modern Web applications combine and use JavaScript-based content from multiple untrusted sources. Wi...
It is well recognized that JavaScript can be exploited to launch browser-based security attacks. We ...
In today s web applications, no one disputes the important role of JavaScript asa client-side progra...
The large majority of websites nowadays embeds third-party JavaScript into their pages, coming from ...
Abstract—A typical Web 2.0 application usually includes JavaScript from various sources with differe...
Existing approaches to providing security for untrusted JavaScript include isolation of capabilities...
Modern web applications are conglomerations ofJavaScript written by multiple authors: application de...
International audienceProviding security guarantees for systems built out of untrusted components re...
Modern web applications are conglomerations of JavaScript written by multiple authors: application d...
We study methods that allow web sites to safely combine JavaScript from untrusted sources. If implem...
Isolating programs is an important mechanism to support more secure applica-tions. Isolating program...
Web applications are the most important gateway to the Internet. Billions of users are relying on th...