Web Application Security Using JSFlow

Daniel Hedin, A. Sabelfeld
{"title":"Web Application Security Using JSFlow","authors":"Daniel Hedin, A. Sabelfeld","doi":"10.1109/SYNASC.2015.11","DOIUrl":null,"url":null,"abstract":"Web applications are often vulnerable to code injection attacks and to attacks through buggy or malicious libraries. Unfortunately, the current protection mechanisms are frequently ad-hoc, as a response to attacks after the fact. This had lead to a plethora of specialized protection mechanisms that are often brittle and insufficient to guarantee security. This extended abstract accompanies a tutorial on web application security using JSFlow, an information-flow aware interpreter for full non-strict ECMA-262(v.5). In contrast to access control, which most current protection mechanisms apply, information-flow control focuses on what applications are allowed to do with the information they access. This removes the inherent trust that access control places on entities that are granted access. Dispensing with this trust is key for the protection to withstand bypassing in the presence of untrustworthy 3rd party code and code injection attacks. Based on two practical attacks against an example web application Hrafn, we demonstrate the power of JSFlow. The attacks model the scenario where the current standards protection mechanism are bypassed or not applicable. By using a simple and natural security policy, we show how both attacks are prevented byJSFlow. Although information-flow control has not been tailor made to preventthis kind of attacks, it offers a uniform line of defense against untrustworthyand malicious code and ensures confidentiality of sensitive data.","PeriodicalId":6488,"journal":{"name":"2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","volume":"30 1","pages":"16-19"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SYNASC.2015.11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Web applications are often vulnerable to code injection attacks and to attacks through buggy or malicious libraries. Unfortunately, the current protection mechanisms are frequently ad-hoc, as a response to attacks after the fact. This had lead to a plethora of specialized protection mechanisms that are often brittle and insufficient to guarantee security. This extended abstract accompanies a tutorial on web application security using JSFlow, an information-flow aware interpreter for full non-strict ECMA-262(v.5). In contrast to access control, which most current protection mechanisms apply, information-flow control focuses on what applications are allowed to do with the information they access. This removes the inherent trust that access control places on entities that are granted access. Dispensing with this trust is key for the protection to withstand bypassing in the presence of untrustworthy 3rd party code and code injection attacks. Based on two practical attacks against an example web application Hrafn, we demonstrate the power of JSFlow. The attacks model the scenario where the current standards protection mechanism are bypassed or not applicable. By using a simple and natural security policy, we show how both attacks are prevented byJSFlow. Although information-flow control has not been tailor made to preventthis kind of attacks, it offers a uniform line of defense against untrustworthyand malicious code and ensures confidentiality of sensitive data.
使用JSFlow的Web应用程序安全性
Web应用程序经常容易受到代码注入攻击以及通过有缺陷或恶意库进行的攻击。不幸的是,当前的保护机制经常是临时的,作为事后对攻击的响应。这导致了过多的专门保护机制,这些机制往往很脆弱,不足以保证安全。这个扩展的摘要附带了一个关于使用JSFlow的web应用程序安全性的教程,JSFlow是一个完全非严格ECMA-262(v.5)的信息流感知解释器。与大多数当前保护机制应用的访问控制不同,信息流控制关注的是允许应用程序对它们访问的信息执行哪些操作。这消除了访问控制对被授予访问权限的实体的固有信任。放弃这种信任是在不可信的第三方代码和代码注入攻击存在的情况下抵御绕过的关键。基于对示例web应用程序Hrafn的两次实际攻击,我们演示了JSFlow的强大功能。攻击模拟了当前标准保护机制被绕过或不适用的场景。通过使用一个简单而自然的安全策略,我们展示了jsflow如何阻止这两种攻击。虽然信息流控制并不是专门用来防止这种攻击的,但它提供了一道统一的防线来抵御不可信的恶意代码,并确保敏感数据的机密性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信