WebJail: least-privilege integration of third-party components in web mashups

  • Authors:
  • Steven Van Acker;Philippe De Ryck;Lieven Desmet;Frank Piessens;Wouter Joosen

  • Affiliations:
  • IBBT-Distrinet, Katholieke Universiteit Leuven, Leuven, Belgium;IBBT-Distrinet, Katholieke Universiteit Leuven, Leuven, Belgium;IBBT-Distrinet, Katholieke Universiteit Leuven, Leuven, Belgium;IBBT-Distrinet, Katholieke Universiteit Leuven, Leuven, Belgium;IBBT-Distrinet, Katholieke Universiteit Leuven, Leuven, Belgium

  • Venue:
  • Proceedings of the 27th Annual Computer Security Applications Conference
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

In the last decade, the Internet landscape has transformed from a mostly static world into Web 2.0, where the use of web applications and mashups has become a daily routine for many Internet users. Web mashups are web applications that combine data and functionality from several sources or components. Ideally, these components contain benign code from trusted sources. Unfortunately, the reality is very different. Web mashup components can misbehave and perform unwanted actions on behalf of the web mashup's user. Current mashup integration techniques either impose no restrictions on the execution of a third-party component, or simply rely on the Same-Origin Policy. A least-privilege approach, in which a mashup integrator can restrict the functionality available to each component, can not be implemented using the current integration techniques, without ownership over the component's code. We propose WebJail, a novel client-side security architecture to enable least-privilege integration of components into a web mashup, based on high-level policies that restrict the available functionality in each individual component. The policy language was synthesized from a study and categorization of sensitive operations in the upcoming HTML 5 JavaScript APIs, and full mediation is achieved via the use of deep aspects in the browser. We have implemented a prototype of WebJail in Mozilla Firefox 4.0, and applied it successfully to mainstream platforms such as iGoogle and Facebook. In addition, microbenchmarks registered a negligible performance penalty for page load-time (7ms), and the execution overhead in case of sensitive operations (0.1ms).