Program Analysis for Web Security

被引:0
|
作者
Mitchell, John C. [1 ]
机构
[1] Stanford Univ, Stanford, CA 94305 USA
来源
STATIC ANALYSIS | 2011年 / 6887卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The evolving nature of web applications and the languages they are written in continually present new challenges and new research opportunities. For example, web sites that present trusted and untrusted code to web users aim to provide isolation and secure mediation across a defined interface. Older versions of Java Script make it difficult for one section of code to provide limited access to another, while improvements in standardized ECMAScript bring the problem closer to traditional language-based encapsulation. As a result, rigorous language semantics and acceptable limitations on the language constructs used in trusted code make provable solutions possible. We have developed sound program analysis tools for specific versions of ECMAScript 5, providing security guarantees against threats from untrusted code in a larger language. However, many security problems remain and there are many ways that future language tools may improve web security and developer productivity.
引用
收藏
页码:4 / 4
页数:1
相关论文
共 50 条
  • [1] Analysis of Security on Web Site
    Li, Meihong
    Liu, Qiang
    Du, Ye
    Liu, Jidiang
    [J]. 2012 INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION AND COMPUTER TECHNOLOGY (ICFCCT 2012), 2012, : 121 - +
  • [2] THE ANALYSIS OF THE SECURITY PROBLEM IN WEB
    Gao Wenju
    Ren Yueou
    Li Qiuju
    Wang Mingqian
    Li Zhe
    [J]. 2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT (ICCTD 2011), VOL 1, 2012, : 37 - 41
  • [3] Security Research: Program Analysis Meets Security
    Oracle Labs, Brisbane
    QLD
    4000, Australia
    [J]. Lect. Notes Comput. Sci., (162-168):
  • [4] Analysis of web services backbone security
    Abuelyaman, E
    Chopde, RS
    Elyaman, M
    [J]. ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 1, Proceedings: COMMUNICATIONS, INFORMATION TECHNOLOGIES AND COMPUTING, 2004, : 16 - 22
  • [5] An Analysis of Security Features on Web Browsers
    Sengupta, Siddhartha
    Park, Joon
    [J]. PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 436 - 443
  • [6] Analysis and Suggestions for the Security of Web Applications
    Yu, You
    Yang, Yuanyuan
    Gu, Jian
    Shen, Liang
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 236 - 240
  • [7] Web security: Authentication protocols and their analysis
    Wen, W
    Mizoguchi, F
    [J]. NEW GENERATION COMPUTING, 2001, 19 (03) : 283 - 299
  • [8] Web security: Authentication protocols and their analysis
    Wu Wen
    Fumio Mizoguchi
    [J]. New Generation Computing, 2001, 19 : 283 - 299
  • [9] Dataset for Web Traffic Security Analysis
    Lescisin, Michael
    Mahmoud, Qusay H.
    [J]. IECON 2018 - 44TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2018, : 2700 - 2705
  • [10] Security Analysis of Bioinformatics WEB Application
    Tao, Tao
    Chen, Yuan
    Liu, Bijing
    Jin, Xueqi
    Yan, Mingyuan
    Ji, Shouling
    [J]. SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 383 - 397