International audienceClient-side JavaScript programs often interact with the web page into which they are included, as well as with the browser itself, through APIs such as the DOM API, the XMLHttpRequest API, and the W3C Geolocation API. Precise reasoning about JavaScript security must therefore take API invocation into account. However, the continuous emergence of new APIs, and the het-erogeneity of their forms and features, renders API behavior a moving target that is particularly hard to capture. To tackle this problem, we propose a methodology for modularly extending sound JavaScript information flow monitors with a generic API. Hence, to verify whether an extended monitor complies with the proposed noninterference property requires o...
ModernWeb 2.0 pages combine scripts from several sources into a single client-side JavaScript progra...
The Web is evolving into a melting pot of content coming from multiple stakeholders. In this mutuall...
Web browsers routinely handle private information. Owing to a lax security model, browsers and JavaS...
Securing JavaScript in the browser is an open and challenging problem. Code from pervasive third-par...
JavaScript drives the evolution of the web into a powerful application platform. Increasingly, web a...
In this thesis, we address the issue of enforcing confidentiality and integrity policies in the cont...
Part 6: Information Flow ControlInternational audienceWeb application designers and users alike are ...
Tracking information flow in dynamic languages remains an important and intricate problem. This pape...
Secure integration of third-party code is one of the prime challenges for securing today\u27s web. R...
JavaScript has become a central technology of the web, but it is also the source of many security pr...
Abstract. Websites today routinely combine JavaScript from multi-ple sources, both trusted and untru...
JavaScript drives the evolution of the web into a powerful application platform. Increasingly, web a...
Nous nous intéressons à la mise en œuvre des politiques de confidentialité et d'intégrité des donnée...
In the standard web browser programming model, third-party scripts included in an application execut...
In the standard web browser programming model, third-party scripts included in an application execut...
ModernWeb 2.0 pages combine scripts from several sources into a single client-side JavaScript progra...
The Web is evolving into a melting pot of content coming from multiple stakeholders. In this mutuall...
Web browsers routinely handle private information. Owing to a lax security model, browsers and JavaS...
Securing JavaScript in the browser is an open and challenging problem. Code from pervasive third-par...
JavaScript drives the evolution of the web into a powerful application platform. Increasingly, web a...
In this thesis, we address the issue of enforcing confidentiality and integrity policies in the cont...
Part 6: Information Flow ControlInternational audienceWeb application designers and users alike are ...
Tracking information flow in dynamic languages remains an important and intricate problem. This pape...
Secure integration of third-party code is one of the prime challenges for securing today\u27s web. R...
JavaScript has become a central technology of the web, but it is also the source of many security pr...
Abstract. Websites today routinely combine JavaScript from multi-ple sources, both trusted and untru...
JavaScript drives the evolution of the web into a powerful application platform. Increasingly, web a...
Nous nous intéressons à la mise en œuvre des politiques de confidentialité et d'intégrité des donnée...
In the standard web browser programming model, third-party scripts included in an application execut...
In the standard web browser programming model, third-party scripts included in an application execut...
ModernWeb 2.0 pages combine scripts from several sources into a single client-side JavaScript progra...
The Web is evolving into a melting pot of content coming from multiple stakeholders. In this mutuall...
Web browsers routinely handle private information. Owing to a lax security model, browsers and JavaS...