JavaScript instrumentation for browser security

  • Authors:
  • Dachuan Yu;Ajay Chander;Nayeem Islam;Igor Serikov

  • Affiliations:
  • DoCoMo Communications Laboratories USA, Inc.;DoCoMo Communications Laboratories USA, Inc.;DoCoMo Communications Laboratories USA, Inc.;DoCoMo Communications Laboratories USA, Inc.

  • Venue:
  • Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
  • Year:
  • 2007

Quantified Score

Hi-index 0.02

Visualization

Abstract

It is well recognized that JavaScript can be exploited to launch browser-based security attacks. We propose to battle such attacks using program instrumentation. Untrusted JavaScript code goes through a rewriting process which identifies relevant operations, modifies questionable behaviors, and prompts the user (a web page viewer) for decisions on how to proceed when appropriate. Our solution is parametric with respect to the security policy-the policy is implemented separately from the rewriting, and the same rewriting process is carried out regardless of which policy is in use. Be-sides providing a rigorous account of the correctness of our solution, we also discuss practical issues including policy management and prototype experiments. A useful by-product of our work is an operational semantics of a core subset of JavaScript, where code embedded in (HTML) documents may generate further document pieces (with new code embedded) at runtime, yielding a form of self-modifying code.