A two-tier sandbox architecture for untrusted JavaScript
暂无分享,去创建一个
[1] Giovanni Vigna,et al. Detecting malicious JavaScript code in Mozilla , 2005, 10th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'05).
[2] Ankur Taly,et al. Language-Based Isolation of Untrusted JavaScript , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[3] David Sands,et al. Lightweight self-protecting JavaScript , 2009, ASIACCS '09.
[4] Wouter Joosen,et al. WebJail: least-privilege integration of third-party components in web mashups , 2011, ACSAC '11.
[5] Cristina V. Lopes,et al. Aspect-oriented programming , 1999, ECOOP Workshops.
[6] Thorsten Holz,et al. IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM , 2011, RAID.
[7] Benjamin Livshits,et al. ConScript: Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser , 2010, 2010 IEEE Symposium on Security and Privacy.
[8] Michael Hicks,et al. Defeating script injection attacks with browser-enforced embedded policies , 2007, WWW '07.
[9] David Sands,et al. Safe Wrappers and Sane Policies for Self Protecting JavaScript , 2010, NordSec.
[10] Wouter Joosen,et al. Security of Web Mashups: A Survey , 2010, NordSec.
[11] V. N. Venkatakrishnan,et al. AdJail: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements , 2010, USENIX Security Symposium.
[12] Zhenkai Liang,et al. Towards Fine-Grained Access Control in JavaScript Contexts , 2011, 2011 31st International Conference on Distributed Computing Systems.
[13] Úlfar Erlingsson,et al. Automated Analysis of Security-Critical JavaScript APIs , 2011, 2011 IEEE Symposium on Security and Privacy.
[14] Leo A. Meyerovich,et al. Object views: fine-grained sharing in browsers , 2010, WWW '10.
[15] Ankur Taly,et al. Isolating JavaScript with Filters, Rewriting, and Wrappers , 2009, ESORICS.
[16] Ankur Taly,et al. Object Capabilities and Isolation of Untrusted Web Applications , 2010, 2010 IEEE Symposium on Security and Privacy.
[17] Joe Gibbs Politz,et al. ADsafety: Type-Based Verification of JavaScript Sandboxing , 2011, USENIX Security Symposium.
[18] Tom Van Cutsem,et al. Proxies: design principles for robust object-oriented intercession APIs , 2010, DLS '10.
[19] Helen J. Wang,et al. BrowserShield: vulnerability-driven filtering of dynamic HTML , 2006, OSDI '06.
[20] Cristina V. Lopes,et al. Aspect-oriented programming , 1999, ECOOP Workshops.
[21] Lujo Bauer,et al. Edit automata: enforcement mechanisms for run-time security policies , 2005, International Journal of Information Security.