메뉴 건너뛰기




Volumn , Issue , 2013, Pages 653-669

Language-based defenses against untrusted browser origins

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMMING INTERFACES (API); HIGH LEVEL LANGUAGES; LIBRARIES; WEBSITES;

EID: 85076276087     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (31)

References (44)
  • 1
    • 85084160402 scopus 로고    scopus 로고
    • Rootkits for JavaScript environments
    • B. Adida, A. Barth, and C. Jackson. Rootkits for JavaScript environments. In WOOT, 2009.
    • (2009) WOOT
    • Adida, B.1    Barth, A.2    Jackson, C.3
  • 3
    • 84857879906 scopus 로고    scopus 로고
    • Multiple facets for dynamic information flow
    • T. Austin and C. Flanagan. Multiple facets for dynamic information flow. In POPL, pages 165-178, 2012.
    • (2012) POPL , pp. 165-178
    • Austin, T.1    Flanagan, C.2
  • 5
    • 85076318210 scopus 로고    scopus 로고
    • Keys to the cloud: Formal analysis and concrete attacks on encrypted web storage
    • C. Bansal, K. Bhargavan, A. Delignat-Lavaud, and S. Maffeis. Keys to the cloud: Formal analysis and concrete attacks on encrypted web storage. In POST, 2013.
    • (2013) POST
    • Bansal, C.1    Bhargavan, K.2    Delignat-Lavaud, A.3    Maffeis, S.4
  • 6
    • 84866927100 scopus 로고    scopus 로고
    • Discovering concrete attacks on website authorization by formal analysis
    • C. Bansal, K. Bhargavan, and S. Maffeis. Discovering concrete attacks on website authorization by formal analysis. In CSF, pages 247-262, 2012.
    • (2012) CSF , pp. 247-262
    • Bansal, C.1    Bhargavan, K.2    Maffeis, S.3
  • 7
    • 77954611153 scopus 로고    scopus 로고
    • Attacks on JavaScript mashup communication
    • A. Barth, C. Jackson, and W. Li. Attacks on JavaScript mashup communication. In W2SP, 2009.
    • (2009) W2SP
    • Barth, A.1    Jackson, C.2    Li, W.3
  • 10
    • 85084162607 scopus 로고    scopus 로고
    • Web-based attacks on host-proof encrypted storage
    • K. Bhargavan and A. Delignat-Lavaud. Web-based attacks on host-proof encrypted storage. In WOOT, 2012.
    • (2012) WOOT
    • Bhargavan, K.1    Delignat-Lavaud, A.2
  • 12
    • 33947683919 scopus 로고    scopus 로고
    • Verified interoperable implementations of security protocols
    • K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse. Verified interoperable implementations of security protocols. In CSFW, pages 139-152, 2006.
    • (2006) CSFW , pp. 139-152
    • Bhargavan, K.1    Fournet, C.2    Gordon, A.D.3    Tse, S.4
  • 14
    • 84976755024 scopus 로고
    • F-bounded polymorphism for object-oriented programming
    • P. Canning, W. Cook, W. Hill, W. Olthoff, and J. Mitchell. F-bounded polymorphism for object-oriented programming. In FPCA, pages 273-280, 1989.
    • (1989) FPCA , pp. 273-280
    • Canning, P.1    Cook, W.2    Hill, W.3    Olthoff, W.4    Mitchell, J.5
  • 17
    • 84869386885 scopus 로고    scopus 로고
    • FlowFox: A web browser with flexible and precise information flow control
    • W. De Groef, D. Devriese, N. Nikiforakis, and F. Piessens. FlowFox: a web browser with flexible and precise information flow control. In CCS, pages 748-759, 2012.
    • (2012) CCS , pp. 748-759
    • De Groef, W.1    Devriese, D.2    Nikiforakis, N.3    Piessens, F.4
  • 19
    • 70349266256 scopus 로고    scopus 로고
    • Verifiable functional purity in Java
    • M. Finifter, A. Mettler, N. Sastry, and D. Wagner. Verifiable functional purity in Java. In CCS, pages 161-174. ACM, 2008.
    • (2008) CCS , pp. 161-174
    • Finifter, M.1    Mettler, A.2    Sastry, N.3    Wagner, D.4
  • 20
    • 85180542459 scopus 로고    scopus 로고
    • Preventing capability leaks in secure JavaScript subsets
    • M. Finifter, J. Weinberger, and A. Barth. Preventing Capability Leaks in Secure JavaScript Subsets. In BDSS, 2010.
    • (2010) BDSS
    • Finifter, M.1    Weinberger, J.2    Barth, A.3
  • 22
    • 85076288737 scopus 로고    scopus 로고
    • P. Haack. JSON hijacking. http://hhacked.com/2009/06/25/json-hijacking.aspx, 2009.
    • (2009) JSON Hijacking
    • Haack, P.1
  • 23
    • 84895539842 scopus 로고    scopus 로고
    • The OAuth 2.0 authorization framework
    • D. Hardt. The OAuth 2.0 authorization framework. IETF RFC 6749, 2012.
    • (2012) IETF RFC 6749
    • Hardt, D.1
  • 24
    • 84866904012 scopus 로고    scopus 로고
    • Information-flow security for a core of JavaScript
    • D. Hedin and A. Sabelfeld. Information-flow security for a core of JavaScript. In CSF, pages 3-18, 2012.
    • (2012) CSF , pp. 3-18
    • Hedin, D.1    Sabelfeld, A.2
  • 26
    • 80051985460 scopus 로고    scopus 로고
    • Isolating JavaScript with filters, rewriting, and wrappers
    • S. Maffeis, J. C. Mitchell, and A. Taly. Isolating JavaScript with filters, rewriting, and wrappers. In ESORICS'09, 2009.
    • (2009) ESORICS'09
    • Maffeis, S.1    Mitchell, J.C.2    Taly, A.3
  • 27
    • 85076285636 scopus 로고    scopus 로고
    • Object views: Fine-grained sharing in browsers
    • L. Meyerovich, A. Porter Felt, and M. Miller. Object views: Fine-grained sharing in browsers. In WWW, 2010.
    • (2010) WWW
    • Meyerovich, L.1    Porter Felt, A.2    Miller, M.3
  • 28
    • 77955186827 scopus 로고    scopus 로고
    • ConScript: Specifying and enforcing fine-grained security policies for JavaScript in the browser
    • L. Meyerovich and B. Livshits. ConScript: Specifying and enforcing fine-grained security policies for JavaScript in the browser. In IEEE S & P, 2010.
    • (2010) IEEE S & P
    • Meyerovich, L.1    Livshits, B.2
  • 31
    • 77952327855 scopus 로고    scopus 로고
    • Lightweight self-protecting JavaScript
    • P. Phung, D. Sands, and D. Chudnov. Lightweight self-protecting JavaScript. In ASIACCS, 2009.
    • (2009) ASIACCS
    • Phung, P.1    Sands, D.2    Chudnov, D.3
  • 33
    • 0003663728 scopus 로고    scopus 로고
    • Type inference in the presence of subtyping: From theory to practice
    • September
    • F. Pottier. Type inference in the presence of subtyping: from theory to practice. Research Report 3483, INRIA, September 1998.
    • (1998) Research Report 3483, INRIA
    • Pottier, F.1
  • 35
    • 80755172908 scopus 로고    scopus 로고
    • Busting frame busting: A study of clickjacking vulnerabilities at popular sites
    • G. Rydstedt, E. Bursztein, D. Boneh, and C. Jackson. Busting frame busting: a study of clickjacking vulnerabilities at popular sites. In W2SP'10, 2010.
    • (2010) W2SP'10
    • Rydstedt, G.1    Bursztein, E.2    Boneh, D.3    Jackson, C.4
  • 37
    • 77950845925 scopus 로고    scopus 로고
    • Symmetric cryptography in JavaScript
    • E. Stark, M. Hamburg, and D. Boneh. Symmetric cryptography in JavaScript. In ACSAC, pages 373-381, 2009.
    • (2009) ACSAC , pp. 373-381
    • Stark, E.1    Hamburg, M.2    Boneh, D.3
  • 41
    • 84878355933 scopus 로고    scopus 로고
    • Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services
    • IEEE Computer Society
    • R. Wang, S. Chen, and X. Wang. Signing me onto your accounts through facebook and google: A traffic-guided security study of commercially deployed single-sign-on web services. In IEEE S & P, pages 365-379. IEEE Computer Society, 2012.
    • (2012) IEEE S & P , pp. 365-379
    • Wang, R.1    Chen, S.2    Wang, X.3
  • 42
    • 80051991045 scopus 로고    scopus 로고
    • How to shop for free online - Security analysis of cashier-as-a-service based web stores
    • R. Wang, S. Chen, X. Wang, and S. Qadeer. How to shop for free online - security analysis of cashier-as-a-service based web stores. In IEEE S & P, pages 465-480, 2011.
    • (2011) IEEE S & P , pp. 465-480
    • Wang, R.1    Chen, S.2    Wang, X.3    Qadeer, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.