The {Emperor's} new password manager: Security analysis of web-based password managers

Z Li, W He, D Akhawe, D Song - 23rd USENIX security symposium …, 2014 - usenix.org
We conduct a security analysis of five popular web-based password managers. Unlike
“local” password managers, web-based password managers run in the browser. We identify …

Building web applications on top of encrypted data using Mylar

RA Popa, E Stark, S Valdez, J Helfer… - … USENIX Symposium on …, 2014 - usenix.org
Web applications rely on servers to store and process confidential information. However,
anyone who gains access to the server (eg, an attacker, a curious administrator, or a …

Breaking web applications built on top of encrypted data

P Grubbs, R McPherson, M Naveed… - Proceedings of the …, 2016 - dl.acm.org
We develop a systematic approach for analyzing client-server applications that aim to hide
sensitive user data from untrusted servers. We then apply it to Mylar, a framework that uses …

Preventing dynamic library compromise on node. js via rwx-based privilege reduction

N Vasilakis, CA Staicu, G Ntousakis, K Kallas… - Proceedings of the …, 2021 - dl.acm.org
Third-party libraries ease the development of large-scale software systems. However,
libraries often execute with significantly more privilege than needed to complete their task …

Automated partitioning of android applications for trusted execution environments

K Rubinov, L Rosculete, T Mitra… - Proceedings of the 38th …, 2016 - dl.acm.org
The co-existence of critical and non-critical applications on computing devices, such as
mobile phones, is becoming commonplace. The sensitive segments of a critical application …

[PDF][PDF] The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites.

S Son, V Shmatikov - NDSS, 2013 - cs.utexas.edu
The postMessage mechanism in HTML5 enables Web content from different origins to
communicate with each other, thus relaxing the same origin policy. It is especially popular in …

Gradual ty** embedded securely in JavaScript

N Swamy, C Fournet, A Rastogi, K Bhargavan… - ACM SIGPLAN …, 2014 - dl.acm.org
JavaScript's flexible semantics makes writing correct code hard and writing secure code
extremely difficult. To address the former problem, various forms of gradual ty** have …

deDacota: toward preventing server-side XSS via automatic code and data separation

A Doupe, W Cui, MH Jakubowski, M Peinado… - Proceedings of the …, 2013 - dl.acm.org
Web applications are constantly under attack. They are popular, typically accessible from
anywhere on the Internet, and they can be abused as malware delivery systems. Cross-site …

Fine-grained access control for html5-based mobile applications in android

X **, L Wang, T Luo, W Du - … , ISC 2013, Dallas, Texas, November 13-15 …, 2015 - Springer
HTML5-based mobile applications are becoming more and more popular because they can
run on different platforms. Several newly introduced mobile OS natively support HTML5 …

Language-based defenses against untrusted browser origins

K Bhargavan, A Delignat-Lavaud… - 22nd USENIX Security …, 2013 - usenix.org
We present new attacks and robust countermeasures for security-sensitive components,
such as single sign-on APIs and client-side cryptographic libraries, that need to be safely …