Object Capabilities and Isolation of Untrusted Web Applications

被引:35
|
作者
Maffeis, Sergio [1 ]
Mitchell, John C. [2 ]
Taly, Ankur [2 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, London SW7 2AZ, England
[2] Stanford Univ, Stanford, CA 94305 USA
基金
英国工程与自然科学研究理事会; 美国国家科学基金会;
关键词
Language-based Security; Capabilities; Operational Semantics; !text type='Java']Java[!/text]Script;
D O I
10.1109/SP.2010.16
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing approach for isolating untrusted content: if separate applications are provided disjoint capabilities, a sound object-capability framework should prevent untrusted applications from interfering with each other, without preventing interaction with the user or the hosting page. In developing language-based foundations for isolation proofs based on object-capability concepts, we identify a more general notion of authority safety that also implies resource isolation. After proving that capability safety implies authority safety, we show the applicability of our framework for a specific class of mashups. In addition to proving that a JavaScript subset based on Google Caja is capability safe, we prove that a more expressive subset of JavaScript is authority safe, even though it is not based on the object-capability model.
引用
收藏
页码:125 / 140
页数:16
相关论文
共 50 条
  • [21] Object-based data flow testing of Web applications
    Liu, CH
    Kung, DC
    Hsia, P
    Hsu, CT
    FIRST ASIA-PACIFIC CONFERENCE ON QUALITY SOFTWARE, PROCEEDINGS, 2000, : 7 - 16
  • [22] Distributed system for private web search with untrusted partners
    Romero-Tris, Cristina
    Castella-Roca, Jordi
    Viejo, Alexandre
    COMPUTER NETWORKS, 2014, 67 : 26 - 42
  • [23] Language-Based Isolation of Untrusted Java']JavaScript
    Maffeis, Sergio
    Taly, Ankur
    PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 77 - +
  • [24] Modeling and Calculating Capabilities of Composite Web Applications for Assisted End User Development
    Radeck, Carsten
    Blichmann, Gregor
    Meissner, Klaus
    WEB INFORMATION SYSTEMS AND TECHNOLOGIES (WEBIST 2016), 2017, 292 : 58 - 82
  • [25] Shielding Applications from an Untrusted Cloud with Haven
    Baumann, Andrew
    Peinado, Marcus
    Hunt, Galen
    ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2015, 33 (03):
  • [26] An Approach for Securing Critical Applications in Untrusted Clouds
    Coppolino, Luigi
    D'Antonio, Salvatore
    Mazzeo, Giovanni
    Papale, Gaetano
    Sgaglione, Luigi
    Campanile, Ferdinando
    2018 26TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP 2018), 2018, : 436 - 440
  • [27] A secure jailing system for confining untrusted applications
    van 't Noordende, Guido
    Balogh, Adam
    Hofman, Rutger
    Brazier, Frances M. T.
    Tanenbaum, Andrew S.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 414 - +
  • [28] InkTag: Secure Applications on an Untrusted Operating System
    Hofmann, Owen S.
    Kim, Sangman
    Dunn, Alan M.
    Lee, Michael Z.
    Witchel, Emmett
    ACM SIGPLAN NOTICES, 2013, 48 (04) : 265 - 278
  • [29] Providing secure environments for untrusted network applications
    Zhong, Q
    SIXTH IEEE WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 1997, : 277 - 283
  • [30] Providing secure environments for untrusted network applications
    Hewlett Packard Lab, Bristol, United Kingdom
    Journal of Engineering and Applied Science, 1997, : 277 - 283