The web sso standard openid connect: In-depth formal security analysis and security guidelines
Web-based single sign-on (SSO) services such as Google Sign-In and Log In with Paypal
are based on the OpenID Connect protocol. This protocol enables so-called relying parties …
are based on the OpenID Connect protocol. This protocol enables so-called relying parties …
FlowFox: a web browser with flexible and precise information flow control
We present FlowFox, the first fully functional web browser that implements a precise and
general information flow control mechanism for web scripts based on the technique of …
general information flow control mechanism for web scripts based on the technique of …
Information-flow security for a core of JavaScript
Tracking information flow in dynamic languages remains an important and intricate problem.
This paper makes substantial headway toward understanding the main challenges and …
This paper makes substantial headway toward understanding the main challenges and …
Information flow control in WebKit's JavaScript bytecode
Websites today routinely combine JavaScript from multiple sources, both trusted and
untrusted. Hence, JavaScript security is of paramount importance. A specific interesting …
untrusted. Hence, JavaScript security is of paramount importance. A specific interesting …
[HTML][HTML] Formal methods for web security
In the last few years, many security researchers proposed to endow the web platform with
more rigorous foundations, thus allowing for a precise reasoning on web security issues …
more rigorous foundations, thus allowing for a precise reasoning on web security issues …
CookiExt: Patching the browser against session hijacking attacks
Session cookies constitute one of the main attack targets against client authentication on the
Web. To counter these attacks, modern web browsers implement native cookie protection …
Web. To counter these attacks, modern web browsers implement native cookie protection …
Survey on JavaScript security policies and their enforcement mechanisms in a web browser
N Bielova - The Journal of Logic and Algebraic Programming, 2013 - Elsevier
We observe a rapid growth of web-based applications every day. These applications are
executed in the web browser, where they interact with a variety of information belonging to …
executed in the web browser, where they interact with a variety of information belonging to …
Secure multi-execution: Fine-grained, declassification-aware, and transparent
Recently, much progress has been made on achieving information-flow security via secure
multi-execution. Secure multi-execution (SME) is an elegant way to enforce security by …
multi-execution. Secure multi-execution (SME) is an elegant way to enforce security by …
Friendly fire: cross-app interactions in IoT platforms
IoT platforms enable users to connect various smart devices and online services via reactive
apps running on the cloud. These apps, often developed by third-parties, perform simple …
apps running on the cloud. These apps, often developed by third-parties, perform simple …
Faceted secure multi execution
To enforce non-interference, both Secure Multi-Execution (SME) and Multiple Facets (MF)
rely on the introduction of multi-executions. The attractiveness of these techniques is that …
rely on the introduction of multi-executions. The attractiveness of these techniques is that …