Analyzing Information Flow in Java']JavaScript-based Browser Extensions

被引:60
|
作者
Dhawan, Mohan [1 ]
Ganapathy, Vinod [1 ]
机构
[1] Rutgers State Univ, Dept Comp Sci, Piscataway, NJ 08855 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/ACSAC.2009.43
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Java Script-based browser extensions (JSEs) enhance the core functionality of web browsers by improving their look and feel, and are widely available for commodity browsers. To enable a rich set of functionalities, browsers typically execute JSEs with elevated privileges. For example, unlike JavaScript code in a web application, code in a JSE is not constrained by the same-origin policy. Malicious JSEs can misuse these privileges to compromise confidentiality and integrity, e.g., by stealing sensitive information, such as cookies and saved passwords, or executing arbitrary code on the host system. Even if a JSE is not overtly malicious, vulnerabilities in the JSE and the browser may allow a remote attacker to compromise browser security. We present Sabre (Security Architecture for Browser Extensions), a system that uses in-browser information-flow tracking to analyze JSEs. Sabre associates a label with each in-memory JavaScript object in the browser, which determines whether the object contains sensitive information. Sabre propagates labels as objects are modified by the JSE and passed between browser subsystems. Sabre raises an alert if an object containing sensitive information is accessed in an unsafe way, e.g., if a JSE attempts to send the object over the network or write it to a file. We implemented Sabre by modifying the Firefox browser and evaluated it using both malicious JSEs as well as benign ones that contained exploitable vulnerabilities. Our experiments show that Sabre can precisely identify potential information flow violations by JSEs.
引用
收藏
页码:382 / 391
页数:10
相关论文
共 50 条
  • [41] CSS Browser Selector Plus: A Java']JavaScript Library to Support Cross-browser Responsive Design
    Johansen, Richard Duchatsch
    Pagani Britto, Talita C.
    Cusin, Cesar Augusto
    [J]. PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'13 COMPANION), 2013, : 27 - 29
  • [42] Towards a type system for analyzing Java']JavaScript programs
    Thiemann, P
    [J]. PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2005, 3444 : 408 - 422
  • [43] Dynamic Flow Analysis for Java']JavaScript
    Naus, Nico
    Thiemann, Peter
    [J]. TRENDS IN FUNCTIONAL PROGRAMMING (TFP 2016), 2019, 10447 : 75 - 93
  • [44] An Information Flow Monitor-Inlining Compiler for Securing a Core of Java']JavaScript
    Santos, Jose Fragoso
    Rezk, Tamara
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 278 - 292
  • [45] Virtual Worlds on Demand? Model-Driven Development of Java']JavaScript-based Virtual World UI Components for Mobile Apps
    Stuerner, Matthias
    Brune, Philipp
    [J]. PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT (MODELSWARD 2016), 2016, : 648 - 655
  • [46] Web browser as medical educator/researcher using HTML']HTML & Java']JavaScript
    Johnson, CW
    Oser, G
    Abedor, AJ
    [J]. JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 1998, : 1023 - 1023
  • [47] js']jsPsych: A Java']JavaScript library for creating behavioral experiments in a Web browser
    de Leeuw, Joshua R.
    [J]. BEHAVIOR RESEARCH METHODS, 2015, 47 (01) : 1 - 12
  • [48] Java']JavaScript tools for online information retrieval
    Gamage, Ruwan
    Dong, Hui
    [J]. ONLINE INFORMATION REVIEW, 2006, 30 (04) : 380 - 394
  • [49] Technique of Java']Javascript Code Obfuscation Based on Control Flow Tansformations
    Wang Zhiyue
    Wu Weimin
    [J]. COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 391 - 394
  • [50] An Exploratory Study of Analyzing Java']JavaScript Online Code Clones
    Misu, Md Rakib Hossain
    Satter, Abdus
    [J]. 30TH IEEE/ACM INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC 2022), 2022, : 94 - 98