Object Capabilities and Isolation of Untrusted Web Applications

被引:35
|
作者
Maffeis, Sergio [1 ]
Mitchell, John C. [2 ]
Taly, Ankur [2 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, London SW7 2AZ, England
[2] Stanford Univ, Stanford, CA 94305 USA
基金
英国工程与自然科学研究理事会; 美国国家科学基金会;
关键词
Language-based Security; Capabilities; Operational Semantics; !text type='Java']Java[!/text]Script;
D O I
10.1109/SP.2010.16
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing approach for isolating untrusted content: if separate applications are provided disjoint capabilities, a sound object-capability framework should prevent untrusted applications from interfering with each other, without preventing interaction with the user or the hosting page. In developing language-based foundations for isolation proofs based on object-capability concepts, we identify a more general notion of authority safety that also implies resource isolation. After proving that capability safety implies authority safety, we show the applicability of our framework for a specific class of mashups. In addition to proving that a JavaScript subset based on Google Caja is capability safe, we prove that a more expressive subset of JavaScript is authority safe, even though it is not based on the object-capability model.
引用
收藏
页码:125 / 140
页数:16
相关论文
共 50 条
  • [31] Multimodal Understanding: Investigating the Capabilities of Large Multimodal Models for Object Detection in XR Applications
    Arnold, Rahel
    Schuldt, Heiko
    PROCEEDINGS OF THE 2ND WORKSHOP ON LARGE GENERATIVE MODELS MEET MULTIMODAL APPLICATIONS, LGM(CUBE)A 2024, 2024, : 26 - 35
  • [32] LDkit: Linked Data Object Graph Mapping Toolkit for Web Applications
    Klima, Karel
    Taelman, Ruben
    Necasky, Martin
    SEMANTIC WEB, ISWC 2023, PT II, 2023, 14266 : 194 - 210
  • [33] An object-based data flow testing approach for Web applications
    Liu, CH
    Kung, DC
    Hsia, P
    Hsu, CT
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2001, 11 (02) : 157 - 179
  • [34] WebWorkFlow: An Object-Oriented Workflow Modeling Language for Web Applications
    Hemel, Zef
    Verhaaf, Ruben
    Visser, Eelco
    MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2008, 5301 : 113 - 127
  • [35] How to Trust a Web Service Monitor Deployed in an Untrusted Environment?
    Hosamani, Mahantesh
    Narayanappa, Harish
    Rajan, Hridesh
    NWESP 2007: THIRD INTERNATIONAL CONFERENCE ON NEXT GENERATION WEB SERVICES PRACTICES, PROCEEDINGS, 2007, : 79 - 84
  • [36] Context-Aware Monitoring of Untrusted Mobile Applications
    Brown, Andrew
    Ryan, Mark
    SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 83 - 96
  • [37] Distributing Web Interaction Capabilities: The Web Interaction Hub
    Albertos-Marco, Felix
    Penichet, Victor M. R.
    Gallud, Jose A.
    PROCEEDINGS OF THE XVII INTERNATIONAL CONFERENCE ON HUMAN COMPUTER INTERACTION INTERACCION 2016, 2016,
  • [38] Safe execution of untrusted applications on embedded network processors
    Bos, Herbert
    Samwel, Bart
    Cristea, Mihai
    Anagnostakis, Kostas
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2008, 3 (04) : 294 - 303
  • [39] Pearl-TEE: Supporting Untrusted Applications in TrustZone
    Huang, Wei
    Rudchenko, Vasily
    Shuang, He
    Huang, Zhen
    Lie, David
    PROCEEDINGS OF THE 3RD WORKSHOP ON SYSTEM SOFTWARE FOR TRUSTED EXECUTION (SYSTEX'18), 2018, : 8 - 13
  • [40] Resilient Authenticated Execution of Critical Applications in Untrusted Environments
    Kirkpatrick, Michael S.
    Ghinita, Gabriel
    Bertino, Elisa
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (04) : 597 - 609