作者: Vineet Rajani , Abhishek Bichhawat , Deepak Garg , Christian Hammer
DOI: 10.1109/CSF.2015.32
关键词:
摘要: Web browsers routinely handle private information. Owing to a lax security model, and JavaScript in particular, are easy targets for leaking sensitive data. Prior work has extensively studied information flow control (IFC) as mechanism securing browsers. However, two central aspects of web -- the Document Object Model (DOM) event handling have so far evaded thorough scrutiny context IFC. This paper advances state-of-the-art this regard. Based on standard specifications code an actual browser engine, we build formal models both DOM (up Level 3) loop typical browser, enhance with fine-grained taints checks IFC, prove our enhancements sound test ideas through instrumentation WebKit, in-production engine. In doing so, observe several channels leak that arise due subtleties its interaction DOM.