An empirical study of information flows in real-world javascript

CA Staicu, D Schoepe, M Balliu, M Pradel… - Proceedings of the 14th …, 2019 - dl.acm.org
Information flow analysis prevents secret or untrusted data from flowing into public or trusted
sinks. Existing mechanisms cover a wide array of options, ranging from lightweight taint …

Flaws in flows: Unveiling design flaws via information flow analysis

K Tuma, R Scandariato, M Balliu - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
This paper presents a practical and formal approach to analyze security-centric information
flow policies at the level of the design model. Specifically, we focus on data confidentiality …

Serialdetector: Principled and practical exploration of object injection vulnerabilities for the web

M Shcherbakov, M Balliu - Network and Distributed Systems Security …, 2021 - diva-portal.org
The last decade has seen a proliferation of codereuse attacks in the context of web
applications. These attacks stem from Object Injection Vulnerabilities (OIV) enabling attacker …

Essentialfp: Exposing the essence of browser fingerprinting

A Sjösten, D Hedin, A Sabelfeld - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Web pages aggressively track users for a variety of purposes from targeted advertisements
to enhanced authentication. As browsers move to restrict traditional cookie-based tracking …

Abstract semantic dependency

P Cousot - Static Analysis: 26th International Symposium, SAS …, 2019 - Springer
Dependency is a prevalent notion in computer science. There have been numerous informal
or formal attempts to define viable syntactic and semantic concepts of dependency in …

[PDF][PDF] On the Road with Third-party Apps: Security Analysis of an In-vehicle App Platform.

B Eriksson, J Groth, A Sabelfeld - VEHITS, 2019 - scitepress.org
Digitalization has revolutionized the automotive industry. Modern cars are equipped with
powerful Internetconnected infotainment systems, comparable to tablets and smartphones …

Prudent design principles for information flow control

I Bastys, F Piessens, A Sabelfeld - Proceedings of the 13th Workshop on …, 2018 - dl.acm.org
Recent years have seen a proliferation of research on information flow control. While the
progress has been tremendous, it has also given birth to a bewildering breed of concepts …

Maybe tainted data: Theory and a case study

C Skalka, S Amir-Mohammadian… - Journal of Computer …, 2020 - journals.sagepub.com
Dynamic taint analysis is often used as a defense against low-integrity data in applications
with untrusted user interfaces. An important example is defense against XSS and injection …

Efficiency and automation in threat analysis of software systems

K Tuma - 2021 - search.proquest.com
Context: Security is a growing concern in many organizations. Industries develo**
software systems plan for security early-on to minimize expensive code refactorings after …

Heterogeneous event causal dependency definition for the detection and explanation of multi-step attacks

C Xosanavongsa - 2020 - theses.hal.science
Knowing that a persistent attacker will eventually succeed in gaining a foothold inside the
targeted network despite prevention mechanisms, it is mandatory to perform security …