The web sso standard openid connect: In-depth formal security analysis and security guidelines

D Fett, R Küsters, G Schmitz - 2017 IEEE 30th Computer …, 2017 - ieeexplore.ieee.org
Web-based single sign-on (SSO) services such as Google Sign-In and Log In with Paypal
are based on the OpenID Connect protocol. This protocol enables so-called relying parties …

FlowFox: a web browser with flexible and precise information flow control

W De Groef, D Devriese, N Nikiforakis… - Proceedings of the 2012 …, 2012 - dl.acm.org
We present FlowFox, the first fully functional web browser that implements a precise and
general information flow control mechanism for web scripts based on the technique of …

Information-flow security for a core of JavaScript

D Hedin, A Sabelfeld - 2012 IEEE 25th Computer Security …, 2012 - ieeexplore.ieee.org
Tracking information flow in dynamic languages remains an important and intricate problem.
This paper makes substantial headway toward understanding the main challenges and …

Information flow control in WebKit's JavaScript bytecode

A Bichhawat, V Rajani, D Garg, C Hammer - … , POST 2014, Held as Part of …, 2014 - Springer
Websites today routinely combine JavaScript from multiple sources, both trusted and
untrusted. Hence, JavaScript security is of paramount importance. A specific interesting …

[HTML][HTML] Formal methods for web security

M Bugliesi, S Calzavara, R Focardi - … of Logical and Algebraic Methods in …, 2017 - Elsevier
In the last few years, many security researchers proposed to endow the web platform with
more rigorous foundations, thus allowing for a precise reasoning on web security issues …

CookiExt: Patching the browser against session hijacking attacks

M Bugliesi, S Calzavara, R Focardi… - Journal of Computer …, 2015 - content.iospress.com
Session cookies constitute one of the main attack targets against client authentication on the
Web. To counter these attacks, modern web browsers implement native cookie protection …

Survey on JavaScript security policies and their enforcement mechanisms in a web browser

N Bielova - The Journal of Logic and Algebraic Programming, 2013 - Elsevier
We observe a rapid growth of web-based applications every day. These applications are
executed in the web browser, where they interact with a variety of information belonging to …

Secure multi-execution: Fine-grained, declassification-aware, and transparent

W Rafnsson, A Sabelfeld - Journal of Computer Security, 2016 - content.iospress.com
Recently, much progress has been made on achieving information-flow security via secure
multi-execution. Secure multi-execution (SME) is an elegant way to enforce security by …

Friendly fire: cross-app interactions in IoT platforms

M Balliu, M Merro, M Pasqua… - ACM Transactions on …, 2021 - dl.acm.org
IoT platforms enable users to connect various smart devices and online services via reactive
apps running on the cloud. These apps, often developed by third-parties, perform simple …

Faceted secure multi execution

T Schmitz, M Algehed, C Flanagan… - Proceedings of the 2018 …, 2018 - dl.acm.org
To enforce non-interference, both Secure Multi-Execution (SME) and Multiple Facets (MF)
rely on the introduction of multi-executions. The attractiveness of these techniques is that …