메뉴 건너뛰기




Volumn , Issue , 2010, Pages 270-283

An empirical study of privacy-violating information flows in JavaScript web applications

Author keywords

Dynamic analysis; History sniffing; Information ow; JavaScript; Privacy; Rewriting; Web application; Web security

Indexed keywords

INFORMATION OW; JAVASCRIPT; PRIVACY; REWRITING; WEB APPLICATION; WEB SECURITY;

EID: 78649998785     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866307.1866339     Document Type: Conference Paper
Times cited : (149)

References (32)
  • 1
    • 35048839749 scopus 로고    scopus 로고
    • Information ow analysis in logical form
    • R. Giacobazzi, editor LNCS, Springer-Verlag, Aug.
    • T. Amtoft and A. Banerjee. Information ow analysis in logical form. In R. Giacobazzi, editor, Proceedings of SAS 2004, volume 3148 of LNCS, pages 100-15. Springer-Verlag, Aug. 2004.
    • (2004) Proceedings of SAS 2004 , vol.3148 , pp. 100-15
    • Amtoft, T.1    Banerjee, A.2
  • 3
    • 78649982493 scopus 로고    scopus 로고
    • Bugzilla@Mozilla. Bug 147777 - :visited support allows queries into global history, May. Online
    • Bugzilla@Mozilla. Bug 147777 - :visited support allows queries into global history, May 2002. Online: https://bugzilla.mozilla.org/show-bug.cgi?id= 147777.
    • (2002)
  • 5
    • 77957563684 scopus 로고    scopus 로고
    • Information ow monitor inlining
    • M. Backes and A. Myers, editors IEEE Computer Society, July
    • A. Chudnov and D. A. Naumann. Information ow monitor inlining. In M. Backes and A. Myers, editors, Proceedings of CSF 2010. IEEE Computer Society, July 2010.
    • (2010) Proceedings of CSF 2010
    • Chudnov, A.1    Naumann, D.A.2
  • 6
    • 78649997198 scopus 로고    scopus 로고
    • Online: 5GP020A6LG.html, Feb.
    • A. Clover. Timing attacks on Web privacy. Online: 5GP020A6LG. http://www.securiteam.com/securityreviews/, Feb. 2002.
    • (2002) Timing Attacks on Web Privacy
    • Clover, A.1
  • 7
    • 0016949746 scopus 로고
    • A lattice model of secure information ow
    • D. E. Denning. A lattice model of secure information ow. Commun. ACM, 19(5):236-243, 1976.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 8
    • 77950799484 scopus 로고    scopus 로고
    • Analyzing information ow in JavaScript-based browser extensions
    • C. Payne and M. Franz, editors IEEE Computer Society, Dec.
    • M. Dhawan and V. Ganapathy. Analyzing information ow in JavaScript-based browser extensions. In C. Payne and M. Franz, editors, Proceedings of ACSAC 2009, pages 382-91. IEEE Computer Society, Dec. 2009.
    • (2009) Proceedings of ACSAC 2009 , pp. 382-91
    • Dhawan, M.1    Ganapathy, V.2
  • 9
    • 0034449227 scopus 로고    scopus 로고
    • Timing attacks on Web privacy
    • S. Jajodia, editor ACM Press, Nov
    • E. W. Felten and M. A. Schneider. Timing attacks on Web privacy. In S. Jajodia, editor, Proceedings of CCS 2000, pages 25-32. ACM Press, Nov. 2000.
    • (2000) Proceedings of CCS 2000 , pp. 25-32
    • Felten, E.W.1    Schneider, M.A.2
  • 12
    • 34250634485 scopus 로고    scopus 로고
    • Protecting browser state from Web privacy attacks
    • C. Goble and M. Dahlin, editors ACM Press, May
    • C. Jackson, A. Bortz, D. Boneh, and J. C. Mitchell. Protecting browser state from Web privacy attacks. In C. Goble and M. Dahlin, editors, Proceedings of WWW 2006, pages 737-44. ACM Press, May 2006.
    • (2006) Proceedings of WWW 2006 , pp. 737-44
    • Jackson, C.1    Bortz, A.2    Boneh, D.3    Mitchell, J.C.4
  • 13
    • 34250687159 scopus 로고    scopus 로고
    • Invasive browser sniffing and countermeasures
    • C. Goble and M. Dahlin, editors ACM Press, May
    • M. Jakobsson and S. Stamm. Invasive browser sniffing and countermeasures. In C. Goble and M. Dahlin, editors, Proceedings of WWW 2006, pages 523-32. ACM Press, May 2006.
    • (2006) Proceedings of WWW 2006 , pp. 523-32
    • Jakobsson, M.1    Stamm, S.2
  • 14
    • 84860725517 scopus 로고    scopus 로고
    • Feasibility and real-world implications of Web browser history detection
    • C. Jackson, editor EEE Computer Society, May
    • A. Janc and L. Olejnik. Feasibility and real-world implications of Web browser history detection. In C. Jackson, editor, Proceedings of W2SP 2010. IEEE Computer Society, May 2010.
    • (2010) Proceedings of W2SP 2010
    • Janc, A.1    Olejnik, L.2
  • 16
    • 35348860223 scopus 로고    scopus 로고
    • Defeating script injection attacks with browser-enforced embedded policies
    • P. Patel-Schneider and P. Shenoy, editors ACM Press, May
    • T. Jim, N. Swamy, and M. Hicks. Defeating script injection attacks with browser-enforced embedded policies. In P. Patel-Schneider and P. Shenoy, editors, Proceedings of WWW 2007, pages 601-10. ACM Press, May 2007.
    • (2007) Proceedings of WWW 2007 , pp. 601-10
    • Jim, T.1    Swamy, N.2    Hicks, M.3
  • 17
    • 58549099340 scopus 로고    scopus 로고
    • JavaScript instrumentation in practice
    • G. Ramalingam, editor LNCS, Springer-Verlag, Dec.
    • H. Kikuchi, D. Yu, A. Chander, H. Inamura, and I. Serikov. JavaScript instrumentation in practice. In G. Ramalingam, editor, Proceedings of APLAS 2008, volume 5356 of LNCS, pages 326-41. Springer-Verlag, Dec. 2008.
    • (2008) Proceedings of APLAS 2008 , vol.5356 , pp. 326-41
    • Kikuchi, H.1    Yu, D.2    Chander, A.3    Inamura, H.4    Serikov, I.5
  • 18
    • 77950880816 scopus 로고    scopus 로고
    • Securing Web applications with static and dynamic information ow tracking
    • R. Glück and O. de Moor, editors ACM Press, Jan.
    • M. S. Lam, M. Martin, V. B. Livshits, and J. Whaley. Securing Web applications with static and dynamic information ow tracking. In R. Glück and O. de Moor, editors, Proceedings of PEPM 2008, pages 3-12. ACM Press, Jan. 2008.
    • (2008) Proceedings of PEPM 2008 , pp. 3-12
    • Lam, M.S.1    Martin, M.2    Livshits, V.B.3    Whaley, J.4
  • 19
    • 84970872854 scopus 로고    scopus 로고
    • On-the-y inlining of dynamic security monitors
    • K. Rannenberg and V. Varadharajan, editors, Sept.
    • J. Magazinius, A. Russo, and A. Sabelfeld. On-the-y inlining of dynamic security monitors. In K. Rannenberg and V. Varadharajan, editors, Proceedings of SEC 2010, Sept. 2010.
    • (2010) Proceedings of SEC 2010
    • Magazinius, J.1    Russo, A.2    Sabelfeld, A.3
  • 20
    • 77955186827 scopus 로고    scopus 로고
    • Conscript: Specifying and enforcing fine-grained security policies for javascript in the browser
    • IEEE Computer Society, 2010
    • L. A. Meyerovich and V. B. Livshits. Conscript: Specifying and enforcing fine-grained security policies for javascript in the browser. In Proceedings of IEEE Security and Privacy ("Oakland") 2010, pages 481-496. IEEE Computer Society, 2010.
    • (2010) Proceedings of IEEE Security and Privacy ("Oakland") , pp. 481-496
    • Meyerovich, L.A.1    Livshits, V.B.2
  • 21
    • 24644460258 scopus 로고    scopus 로고
    • Programming with explicit security policies
    • M. Sagiv, editor LNCS, Springer-Verlag, Apr.
    • A. C. Myers. Programming with explicit security policies. In M. Sagiv, editor, Proceedings of ESOP 2005, volume 3444 of LNCS, pages 1-4. Springer-Verlag, Apr. 2005.
    • (2005) Proceedings of ESOP 2005 , vol.3444 , pp. 1-4
    • Myers, A.C.1
  • 22
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • D. Boneh and D. Simon, editors ISOC, Feb.
    • J. Newsome and D. X. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In D. Boneh and D. Simon, editors, Proceedings of NDSS 2005. ISOC, Feb. 2005.
    • (2005) Proceedings of NDSS 2005
    • Newsome, J.1    Song, D.X.2
  • 23
    • 0036037318 scopus 로고    scopus 로고
    • Information ow inference for ML
    • J. C. Mitchell, editor ACM Press, Jan.
    • F. Pottier and V. Simonet. Information ow inference for ML. In J. C. Mitchell, editor, Proceedings of POPL 2002, pages 319-330. ACM Press, Jan. 2002.
    • (2002) Proceedings of POPL 2002 , pp. 319-330
    • Pottier, F.1    Simonet, V.2
  • 25
    • 70350355123 scopus 로고    scopus 로고
    • Tracking information ow in dynamic tree structures
    • M. Backes and P. Ning, editors LNCS, Springer-Verlag, Sept.
    • A. Russo, A. Sabelfeld, and A. Chudnov. Tracking information ow in dynamic tree structures. In M. Backes and P. Ning, editors, Proceedings of ESORICS 2009, volume 5789 of LNCS, pages 86-103. Springer-Verlag, Sept. 2009.
    • (2009) Proceedings of ESORICS 2009 , vol.5789 , pp. 86-103
    • Russo, A.1    Sabelfeld, A.2    Chudnov, A.3
  • 26
    • 85084164620 scopus 로고    scopus 로고
    • Detecting format string vulnerabilities with type qualifiers
    • D. Wallach, editor. USENIX, Aug.
    • U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In D. Wallach, editor, Proceedings of USENIX Security 2001, pages 201-17. USENIX, Aug. 2001.
    • (2001) Proceedings of USENIX Security 2001 , pp. 201-17
    • Shankar, U.1    Talwar, K.2    Foster, J.S.3    Wagner, D.4
  • 27
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information ow tracking
    • K. McKinley, editor ACM Press, Oct.
    • G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information ow tracking. In K. McKinley, editor, Proceedings of ASPLOS 2004, pages 85-96. ACM Press, Oct. 2004.
    • (2004) Proceedings of ASPLOS 2004 , pp. 85-96
    • Suh, G.E.1    Lee, J.W.2    Zhang, D.3    Devadas, S.4
  • 28
    • 33646037706 scopus 로고    scopus 로고
    • Secure information ow as a safety problem
    • C. Hankin, editor LNCS, Springer-Verlag, Sept.
    • T. Terauchi and A. Aiken. Secure information ow as a safety problem. In C. Hankin, editor, Proceedings of SAS 2005, volume 3672 of LNCS, pages 352-67. Springer-Verlag, Sept. 2005.
    • (2005) Proceedings of SAS 2005 , vol.3672 , pp. 352-67
    • Terauchi, T.1    Aiken, A.2
  • 30
    • 84887309913 scopus 로고    scopus 로고
    • Cross site scripting prevention with dynamic data tainting and static analysis
    • W. Arbaugh and C. Cowan, editors. ISOC, Feb.
    • P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Krügel, and G. Vigna. Cross site scripting prevention with dynamic data tainting and static analysis. In W. Arbaugh and C. Cowan, editors, Proceedings of NDSS 2007. ISOC, Feb. 2007.
    • (2007) Proceedings of NDSS 2007
    • Vogt, P.1    Nentwich, F.2    Jovanovic, N.3    Kirda, E.4    Krügel, C.5    Vigna, G.6
  • 31
    • 0033705210 scopus 로고    scopus 로고
    • Verifying secrets and relative secrecy
    • T. Reps, editor ACM Press, Jan.
    • D. Volpano and G. Smith. Verifying secrets and relative secrecy. In T. Reps, editor, Proceedings of POPL 2000, pages 268-76. ACM Press, Jan. 2000.
    • (2000) Proceedings of POPL 2000 , pp. 268-76
    • Volpano, D.1    Smith, G.2
  • 32
    • 34548253921 scopus 로고    scopus 로고
    • JavaScript instrumentation for browser security
    • M. Felleisen, editor ACM Press, Jan.
    • D. Yu, A. Chander, N. Islam, and I. Serikov. JavaScript instrumentation for browser security. In M. Felleisen, editor, Proceedings of POPL 2007, pages 237-49. ACM Press, Jan. 2007.
    • (2007) Proceedings of POPL 2007 , pp. 237-49
    • Yu, D.1    Chander, A.2    Islam, N.3    Serikov, I.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.