Tamper-proof security mechanism against liar objects in JavaScript applicationsPresentation abstract
Many approaches has been proposed to dynamically secure client side web applications allowing developers to express they security policies using some sort of policy language. Those security policies are usually expressed in JavaScript, which has some features like the dynamic type coercion that allow an attacker to bypass those security mechanisms. This has been addressed by giving the developer the option of specifying “inspection types” during the policy declaration. Those inspection types are used to safely coerce the values used during the enforcement and afterwards. However, those mechanism are mostly limited to primitive types and require carefully design of the policy and its inspection types.
We propose the extension of a policy declaration and enforcement mechanism by constructing a coercion model for all the language built-ins. Then, the model is used to safely coerce all the operands or arguments used by the built-ins operations during the policy enforcement and afterwards removing the need of inspection types.
Mon 23 MarDisplayed time zone: Belfast change
11:00 - 12:30 | |||
11:00 30mTalk | Evolution of the WebDSL RuntimeFull paper ProWeb20 Danny Groenewegen Delft University of Technology, Elmer van Chastelet Delft University of Technology, Eelco Visser Delft University of Technology | ||
11:30 30mTalk | Tamper-proof security mechanism against liar objects in JavaScript applicationsPresentation abstract ProWeb20 Angel Luis Scull Pupo Sofware Languages Lab, Vrije Universiteit Brussel, Jens Nicolay Vrije Universiteit Brussel, Belgium, Elisa Gonzalez Boix Vrije Universiteit Brussel, Belgium | ||
12:00 30mTalk | Broken LinksPresentation abstract ProWeb20 |