Protecting Users by Confining {JavaScript} with {COWL}

D Stefan, EZ Yang, P Marchenko, A Russo… - … USENIX Symposium on …, 2014 - usenix.org
Modern web applications are conglomerations of JavaScript written by multiple authors:
application developers routinely incorporate code from third-party libraries, and mashup …

Detecting malicious behaviors in javascript applications

J Mao, J Bian, G Bai, R Wang, Y Chen, Y **ao… - Ieee …, 2018 - ieeexplore.ieee.org
JavaScript applications are widely used in a range of scenarios, including Web applications,
mobile applications, and server-side applications. On one hand, due to its excellent cross …

Auto-patching DOM-based XSS at scale

I Parameshwaran, E Budianto, S Shinde… - Proceedings of the …, 2015 - dl.acm.org
DOM-based cross-site scripting (XSS) is a client-side code injection vulnerability that results
from unsafe dynamic code generation in JavaScript applications, and has few known …

IFC inside: Retrofitting languages with dynamic information flow control

S Heule, D Stefan, EZ Yang, JC Mitchell… - … 2015, Held as Part of the …, 2015 - Springer
Many important security problems in JavaScript, such as browser extension security,
untrusted JavaScript libraries and safe integration of mutually distrustful websites (mash …

SoK: All or nothing-a postmortem of solutions to the third-party script inclusion permission model and a path forward

S Sprecher, C Kerschbaumer… - 2022 IEEE 7th European …, 2022 - ieeexplore.ieee.org
The web execution model allows third-party JavaScript to be leveraged in a single execution
context. Access control for these scripts is currently all or nothing. It has been this way for …

AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content

S Tople, S Shinde, Z Chen, P Saxena - Proceedings of the 2013 ACM …, 2013 - dl.acm.org
Web servers are vulnerable to a large class of attacks which can allow network attacker to
steal sensitive web content. In this work, we investigate the feasibility of a web server …

The sicilian defense: Signature-based whitelisting of web javascript

P Soni, E Budianto, P Saxena - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
Whitelisting has become a common practice to ensure the execution of trusted applications.
However, its effectiveness in protecting client-side web application code has not yet been …

Data Exfiltration in the Face of CSP

S Van Acker, D Hausknecht, A Sabelfeld - … of the 11th ACM on Asia …, 2016 - dl.acm.org
Cross-site scripting (XSS) attacks keep plaguing the Web. Supported by most modern
browsers, Content Security Policy (CSP) prescribes the browser to restrict the features and …

DATS-data containers for web applications

C Hunger, L Vilanova, C Papamanthou… - Proceedings of the …, 2018 - dl.acm.org
Data containers enable users to control access to their data while untrusted applications
compute on it. However, they require replicating an application inside each container …

You can't be me: Enabling trusted paths and user sub-origins in web browsers

E Budianto, Y Jia, X Dong, P Saxena… - Research in Attacks …, 2014 - Springer
Once a web application authenticates a user, it loosely associates all resources owned by
the user to the web session established. Consequently, any scripts injected into the victim …