Filters








744 Hits in 3.2 sec

Transaction-based Sandboxing for JavaScript [article]

Matthias Keil, Peter Thiemann
2017 arXiv   pre-print
This paper presents design and implementation of DecentJS, a language-embedded sandbox for full JavaScript.  ...  The implementation relies on JavaScript proxies to guarantee full interposition for the full language and for all code, including dynamically loaded scripts and code injected via eval.  ...  In particular, Tom Van Cutsem provided helpful advice on the internals of JavaScript proxies.  ... 
arXiv:1612.00669v2 fatcat:xhovkezmzbdo3py3ucx5hx3k4q

1987 IEEE Symposium on Security and Privacy

1986 Computer  
TXBOX is suitable for sandboxing "one-shot" execution of unknown, untrusted programs, as well as for model-based enforcement of system-call behavior of known benign programs. Uncircumventability.  ...  TXBOX is a new system for sandboxing untrusted applications.  ...  We are grateful to our shepherd David Wagner for many helpful comments and to Emmett Witchel for his insightful advice and for guiding the development of TxOS.  ... 
doi:10.1109/mc.1986.1663102 fatcat:cduvzxwakjfyxjqlvejzyhdyym

TxBox: Building Secure, Efficient Sandboxes with System Transactions

Suman Jana, Donald E. Porter, Vitaly Shmatikov
2011 2011 IEEE Symposium on Security and Privacy  
TXBOX is suitable for sandboxing "one-shot" execution of unknown, untrusted programs, as well as for model-based enforcement of system-call behavior of known benign programs. Uncircumventability.  ...  TXBOX is a new system for sandboxing untrusted applications.  ...  We are grateful to our shepherd David Wagner for many helpful comments and to Emmett Witchel for his insightful advice and for guiding the development of TxOS.  ... 
doi:10.1109/sp.2011.33 dblp:conf/sp/JanaPS11 fatcat:thlvosrksjdbfnqn7k6aexkefi

2006 IEEE Symposium on Security and Privacy

2006 2006 IEEE Symposium on Security and Privacy (S&P'06)  
TXBOX is suitable for sandboxing "one-shot" execution of unknown, untrusted programs, as well as for model-based enforcement of system-call behavior of known benign programs. Uncircumventability.  ...  TXBOX is a new system for sandboxing untrusted applications.  ...  We are grateful to our shepherd David Wagner for many helpful comments and to Emmett Witchel for his insightful advice and for guiding the development of TxOS.  ... 
doi:10.1109/sp.2006.20 fatcat:gutozsr4avfwpgpkvrwa4a77fu

1987 IEEE Symposium on Security and Privacy

1986 Computer  
TXBOX is suitable for sandboxing "one-shot" execution of unknown, untrusted programs, as well as for model-based enforcement of system-call behavior of known benign programs. Uncircumventability.  ...  TXBOX is a new system for sandboxing untrusted applications.  ...  We are grateful to our shepherd David Wagner for many helpful comments and to Emmett Witchel for his insightful advice and for guiding the development of TxOS.  ... 
doi:10.1109/mc.1986.1663329 fatcat:u33ipffhdvhzxnmwjwqx4p3xvq

1988 IEEE Symposium on Security and Privacy

1987 Computer  
TXBOX is suitable for sandboxing "one-shot" execution of unknown, untrusted programs, as well as for model-based enforcement of system-call behavior of known benign programs. Uncircumventability.  ...  TXBOX is a new system for sandboxing untrusted applications.  ...  We are grateful to our shepherd David Wagner for many helpful comments and to Emmett Witchel for his insightful advice and for guiding the development of TxOS.  ... 
doi:10.1109/mc.1987.1663423 fatcat:p76ekk6airaxdariqes2bfucey

1987 IEEE Symposium on Security and Privacy

1986 Computer  
TXBOX is suitable for sandboxing "one-shot" execution of unknown, untrusted programs, as well as for model-based enforcement of system-call behavior of known benign programs. Uncircumventability.  ...  TXBOX is a new system for sandboxing untrusted applications.  ...  We are grateful to our shepherd David Wagner for many helpful comments and to Emmett Witchel for his insightful advice and for guiding the development of TxOS.  ... 
doi:10.1109/mc.1986.1663073 fatcat:wvh5tdhog5clrhdrom2tjgv2my

Web Browser Security: Different Attacks Detection and Prevention Techniques

Patil Shital, Chavan R.
2017 International Journal of Computer Applications  
The Attacker can run malicious JavaScript to exploit user system by using these vulnerabilities.  ...  Browser with electrolysis system and sandboxed processes are discussed to prevent the browser from attack.  ...  In multiprocess based tabs, layout rendering and JavaScript code should be put into a sandboxed process to reduce kernel attack surface.  ... 
doi:10.5120/ijca2017914938 fatcat:gim5jnnpfverneo45nd4mtz754

A Language-based Serverless Function Accelerator [article]

Emily Herbert, Arjun Guha
2020 arXiv   pre-print
Moreover, we seamlessly transition between language-based and OS-based sandboxing by leveraging the fact that serverless functions must tolerate re-execution for fault tolerance.  ...  We use a new approach to trace compilation to build source-level, interprocedural, execution trace trees for serverless functions written in JavaScript.  ...  Containerless is built in Rust and is carefully designed to minimize the trusted computing base (TCB). For language-based sandboxing, Containerless generates Rust code from JavaScript.  ... 
arXiv:1911.02178v4 fatcat:7ixzojaicfcfbawawqmy2yujii

JsSandbox: A Framework for Analyzing the Behavior of Malicious JavaScript Code using Internal Function Hooking

Hyoung Chun Kim
2012 KSII Transactions on Internet and Information Systems  
JsSandbox was implemented based on a debugger engine, and some features were applied to detect and analyze malicious JavaScript code: detection of obfuscation, deobfuscation of the obfuscated string, detection  ...  Then, the proposed framework was analyzed for specific features, and the results demonstrate that JsSandbox can be applied to the analysis of the behavior of malicious web pages.  ...  Based on the analysis of the IE modules, the JsSandbox system was implemented for sandboxing malicious JavaScript code in IE 7. Fig. 5 shows the architecture of the JsSandbox system.  ... 
doi:10.3837/tiis.2012.02.019 fatcat:stojza4u55farbjjmlgrm2fa2q

Defeat Information Leakage from Browser Extensions via Data Obfuscation [chapter]

Wentao Chang, Songqing Chen
2013 Lecture Notes in Computer Science  
The obfuscated information is properly restored for legitimate browser transactions. A prototype has been implemented and iObfus works seamlessly with the Chromium 25.  ...  Today web browsers have become the de facto platform for Internet users. This makes browsers the target of a lot of attacks.  ...  Static analysis techniques are utilized to analyze JavaScript-based extensions.  ... 
doi:10.1007/978-3-319-02726-5_3 fatcat:njfzvqicxner7azu2y5z5dvqdi

Emerson

Behram F.T. Mistree, Bhupesh Chandra, Ewen Cheslack-Postava, Philip Levis, David Gay
2011 Proceedings of the 10th SIGPLAN symposium on New ideas, new paradigms, and reflections on programming and software - ONWARD '11  
To simplify scripting for novices, Emerson employs two abstractions: multi-presencing and execution sandboxes.  ...  Execution sandboxes allow safely running application code provided by another object, borrowing the execution and deployment model of modern web applications.  ...  Emerson is based on JavaScript, which is itself heavily influenced by Self [38] .  ... 
doi:10.1145/2048237.2048247 dblp:conf/oopsla/MistreeCCLG11 fatcat:7yn7y2nxhrhaxcvfo36e5cpt5u

RockJIT

Ben Niu, Gang Tan
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
Managed languages such as JavaScript are popular. For performance, modern implementations of managed languages adopt Just-In-Time (JIT) compilation.  ...  Key contributions of RockJIT are a general architecture for securing JIT compilers and a method for generating fine-grained control-flow graphs from C++ code.  ...  ACKNOWLEDGMENTS We thank anonymous reviewers for their helpful comments.  ... 
doi:10.1145/2660267.2660281 dblp:conf/ccs/NiuT14 fatcat:xgz62iicqbfzpkyv3c6ffhiz34

AccTEE

David Goltzsche, Manuel Nieke, Thomas Knauth, Rüdiger Kapitza
2019 Proceedings of the 20th International Middleware Conference on - Middleware '19  
Typically, these computations are executed inside a sandboxed environment for two reasons: first, to isolate the execution in order to protect the host environment from unauthorised access, and second  ...  In this paper we present AccTEE, a two-way sandbox that offers remote computation with resource accounting trusted by consumers and providers.  ...  The system is based on SGX for trusted execution and TSX for transactional memory as well as hyper-threading. It utilises two dedicated threads inside one SGX enclave: a timer and a worker thread.  ... 
doi:10.1145/3361525.3361541 dblp:conf/middleware/GoltzscheNKK19 fatcat:rbuex7jrpfh4dd5gficp7aqgwe

Scriptless attacks

Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk
2012 Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12  
We address the question of whether an attacker really needs JavaScript or similar functionality to perform attacks aiming for information theft.  ...  This approach proves useful for prevention of certain types of attacks we here discuss.  ...  processing or delegating credit card transactions.  ... 
doi:10.1145/2382196.2382276 dblp:conf/ccs/HeiderichNSHS12 fatcat:qf27r473mvdtxakegcujj6w6cm
« Previous Showing results 1 — 15 out of 744 results