作者: Opher Dubrovsky , Saher Esmeir , John Dunagan , Helen J. Wang , Charles Reis
关键词: Exploit 、 Web page 、 Programming language 、 Scripting language 、 Dynamic web page 、 Static web page 、 Dynamic HTML 、 Client-side scripting 、 Computer science 、 Web content
摘要: Vulnerability-driven filtering of network data can offer a fast and easy-to-deploy alternative or intermediary to software patching, as exemplified in Shield [43]. In this paper, we take Shield's vision new domain, inspecting cleansing not just static content, but also dynamic content. The content target is the HTML web pages, which have become popular vector for attacks. key challenge that it undecidable statically determine whether an embedded script will exploit browser at run-time. We avoid undecidability problem by rewriting pages any scripts into safe equivalents, inserting checks so done rewritten contain logic recursively applying run-time dynamically generated modified based on known vulnerabilities. built evaluated BrowserShield, system performs instrumentation scripts, admits policies customized actions like vulnerability-driven filtering.