JavaScript instrumentation for browser security

作者: Dachuan Yu , Ajay Chander , Nayeem Islam , Igor Serikov

DOI: 10.1145/1190215.1190252

关键词:

摘要: … ) [9] and other browser features, JavaScript programs can … implementation will call back to the rewriting process at runtime after E is evaluated. In this section, we organize the above two …

参考文章(17)
Jesse James Garrett, Ajax: A New Approach to Web Applications ,(2007)
Alex Aiken, Yichen Xie, Static detection of security vulnerabilities in scripting languages usenix security symposium. pp. 13- ,(2006)
John C. Mitchell, Neil Chou, Yuka Teraguchi, Robert Ledesma, Client-Side Defense Against Web-Based Identity Theft. network and distributed system security symposium. ,(2004)
Úlfar Erlingsson, Fred B. Schneider, SASI enforcement of security policies: a retrospective new security paradigms workshop. pp. 87- 95 ,(1999) , 10.1145/335169.335201
Algis Rudys, Dan S. Wallach, Termination in language-based systems ACM Transactions on Information and System Security. ,vol. 5, pp. 138- 168 ,(2002) , 10.1145/505586.505589
Fred B. Schneider, Enforceable security policies ACM Transactions on Information and System Security. ,vol. 3, pp. 30- 50 ,(2000) , 10.1145/353323.353382
Jay Ligatti, Lujo Bauer, David Walker, Edit automata: enforcement mechanisms for run-time security policies International Journal of Information Security. ,vol. 4, pp. 2- 16 ,(2005) , 10.1007/S10207-004-0046-8
Robert Wahbe, Steven Lucco, Thomas E. Anderson, Susan L. Graham, Efficient software-based fault isolation symposium on operating systems principles. ,vol. 27, pp. 203- 216 ,(1993) , 10.1145/168619.168635
J.H. Saltzer, M.D. Schroeder, The protection of information in computer systems Proceedings of the IEEE. ,vol. 63, pp. 1278- 1308 ,(1975) , 10.1109/PROC.1975.9939
Christopher Anderson, Paola Giannini, Sophia Drossopoulou, Towards type inference for javascript european conference on object oriented programming. pp. 428- 452 ,(2005) , 10.1007/11531142_19