skip to main content
10.1145/2593761.2593764acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
Article

Enabling the development of safer mashups for open data

Published:01 June 2014Publication History

ABSTRACT

The last decade has seen the evolution of web APIs (Application Programming Interfaces) and open data initiatives promoted by governments. This has encouraged develop- ers to build Mashups, web applications that integrate data from multiple servers. ProgrammableWeb.com reports an as- tounding 11,152 APIs and 7384 Mashups, as of March 2014. The browser security model designed for static web pages, however, was insufficient to mitigate the security concerns in mashups. Recent efforts by researchers have enhanced the security model of browsers and provided newer APIs to meet the security requirements of mashups. However, these low- level APIs require significant skill by developers to use them effectively, to avoid creating possibly unsafe applications. In this paper, we start with a survey of security concerns in the insecure usage of HTML5 APIs, particularly relevant to the security of mashups. We then present a high-level library called SafeMash, which helps developers build safe mashups over the current low-level security APIs in HTML5. SafeMash allows the mashup developer to configure the de- gree of interaction and communication of a widget. It warns developers in case of any misconfiguration. Our initial em- pirical analysis shows that an interactive mashup that does not leverage state-of-the-art browser security features can be rebuilt with SafeMash, without any loss in functionality.

References

  1. Browserscope, 2014. http://www.browserscope.org/.Google ScholarGoogle Scholar
  2. D. Akhawe, P. Saxena, and D. Song. Privilege separation in HTML5 applications. In Proceedings of the USENIX Security Symposium, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Barth. RFC 6454 - The Web Origin Concept. Technical report, 2011. tools.ietf.org/search/rfc6454.Google ScholarGoogle Scholar
  4. A. Barth, C. Jackson, and J. C. Mitchell. Securing frame communication in browsers. Communications of the ACM, 52(6):83–91, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. CERN. The birth of the Web. Technical report, 1989. http://home.web.cern.ch/topics/birth-web.Google ScholarGoogle Scholar
  6. D. Crockford. Rfc4627: The application/json media type for javascript object notation (json), July 2006. http://tools.ietf.org/html/rfc4627.Google ScholarGoogle Scholar
  7. P. De Ryck, M. Decat, L. Desmet, F. Piessens, and W. Joosen. Security of web mashups: a survey. In Information Security Technology for Applications, pages 223–238. Springer, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. T. Fielding and R. N. Taylor. Principled design of the modern Web architecture. ACM Transactions on Internet Technology (TOIT), 2(2):115–150, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Finifter, J. Weinberger, and A. Barth. Preventing Capability Leaks in Secure JavaScript Subsets. In NDSS, 2010.Google ScholarGoogle Scholar
  10. J. J. Garrett. AJAX: A New Approach to Web Applications, Feb 2005. https://web.archive.org/ web/20080702075113/http://www.adaptivepath.com/ ideas/essays/archives/000385.php.Google ScholarGoogle Scholar
  11. S. Hanna, R. Shin, D. Akhawe, A. Boehm, P. Saxena, and D. Song. The Emperor’s New APIs: On the (In)Secure Usage of New Client-side Primitives. In Proceedings of the Web, volume 2, 2010.Google ScholarGoogle Scholar
  12. C. Jackson and H. J. Wang. Subspace: Secure Cross-Domain Communication for Web Mashups. In Proceedings of the 16th international conference on World Wide Web, pages 611–620. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. E. Lawrence. Combating clickjacking with x-frame-options. Blog, March 2010. http: //blogs.msdn.com/b/ieinternals/archive/2010/03/ 30/combating-clickjacking-with-x-frame-options. aspx.Google ScholarGoogle Scholar
  14. J. Magazinius, A. Askarov, and A. Sabelfeld. A lattice-based approach to mashup security. In Proceedings of the 5th ACM symposium on information, computer and communications security, pages 15–23. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. L. A. Meyerovich and B. Livshits. Conscript: Specifying and enforcing fine-grained security policies for javascript in the browser. In Security and Privacy (SP), 2010 IEEE Symposium on, pages 481–496. IEEE, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. G. Robert Hansen. Clickjacking, Dec 2008. http://www.sectheory.com/clickjacking.htm.Google ScholarGoogle Scholar
  17. G. Rydstedt, E. Bursztein, D. Boneh, and C. Jackson. Busting frame busting: a study of clickjacking vulnerabilities at popular sites. In in IEEE Oakland Web 2.0 Security and Privacy (W2SP 2010), 2010.Google ScholarGoogle Scholar
  18. S. Stamm, B. Sterne, and G. Markham. Reining in the web with content security policy. In Proceedings of the 19th international conference on World wide web, pages 921–930. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. K. C. Telikicherla and V. Choppella. Source code and live demonstration of SafeMash, Feb 2014. https://github.com/iiithyd-websec/safemash.Google ScholarGoogle Scholar
  20. W3C. HTML5 CORS-W3C Candidate Recommendation 16 Jan 2014. Technical report. http://www.w3.org/TR/cors/.Google ScholarGoogle Scholar
  21. W3C. HTML5 Web Messaging-W3C Candidate Recommendation 1 May 2012. Technical report. http://www.w3.org/TR/webmessaging/.Google ScholarGoogle Scholar
  22. W3C. Iframe sandbox-W3C Candidate Recommendation 6 August 2013. Technical report. http://www.w3.org/TR/html5/embedded-content-0. html#the-iframe-element.Google ScholarGoogle Scholar
  23. W3C. Simple Object Access Protocol (SOAP) 1.1. http://www.w3.org/TR/soap/.Google ScholarGoogle Scholar
  24. W3C. Content Security Policy 1.1-W3C Working Draft 11 February 2014. Technical report, 2014. http://www.w3.org/TR/CSP11/#directives.Google ScholarGoogle Scholar
  25. Wikipedia. Principle of least privilege. http://en.wikipedia.org/wiki/Principle_of_ least_privilege.Google ScholarGoogle Scholar
  26. O. A. Zabir. Dropthings, 2014. https://code.google.com/p/dropthings/.Google ScholarGoogle Scholar

Index Terms

  1. Enabling the development of safer mashups for open data

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          IWP 2014: Proceedings of the 1st International Workshop on Inclusive Web Programming - Programming on the Web with Open Data for Societal Applications
          June 2014
          23 pages
          ISBN:9781450328555
          DOI:10.1145/2593761

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 June 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Upcoming Conference

          ICSE 2025

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader