skip to main content
10.1145/2897073.2897714acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
invited-talk

App security with JSFlow

Published:14 May 2016Publication History

ABSTRACT

This abstract accompanies a demo of app security using JSFlow [7]. The interested reader is encouraged to try the JSFlow tool [8] and get a full account of the theory and practice behind JSFlow, as detailed in a journal article [9].

References

  1. Adobe Inc. Adobe PhoneGap. http://phonegap.com/.Google ScholarGoogle Scholar
  2. M. Balliu, B. Liebe, D. Schoepe, and A. Sabelfeld. Jslinq: Building secure applications across tiers. In CODASPY, Mar. 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. N. Bielova. Survey on javascript security policies and their enforcement mechanisms in a web browser. J. Log. Algebr. Program., pages 243--262, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  4. D. E. Denning and P. J. Denning. Certification of programs for secure information flow. CACM, 20(7):504--513, July 1977. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. ECMA International. ECMAScript Language Specification, 2009. Version 5.Google ScholarGoogle Scholar
  6. J. Gibbs Politz, A. Guha, and S. Krishnamurthi. Typed-based verification of web sandboxes. J. Comput. Secur., 22(4):511--565, July 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. Hedin. MOBILESoft'16 demo. DEMO, located at www.jsflow.net/MOBILESoft16, May 2016.Google ScholarGoogle Scholar
  8. D. Hedin, L. Bello, A. Birgisson, and A. Sabelfeld. JSFlow. The JSFlow project, located at www.jsflow.net, 2013--16.Google ScholarGoogle Scholar
  9. D. Hedin, L. Bello, and A. Sabelfeld. JSFlow: Tracking information flow in javascript and its APIs. JCS, 2016. To appear.Google ScholarGoogle Scholar
  10. D. Hedin and A. Sabelfeld. A perspective on information-flow control. In Software Safety and Security, pages 319--347, 2012.Google ScholarGoogle Scholar
  11. G. Le Guernic. Confidentiality Enforcement Using Dynamic Information Flow Analyses. PhD thesis, Kansas State University, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Magazinius, D. Hedin, and A. Sabelfeld. Architectures for inlining security monitors in web applications. In ESSoS, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. N. Nikiforakis, L. Invernizzi, A. Kapravelos, S. Van Acker, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna. You are what you include: large-scale evaluation of remote JavaScript inclusions. In CCS, Oct. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Sabelfeld and A. C. Myers. Language-based information-flow security. IEEE J. Selected Areas in Communications, 21(1):5--19, Jan. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D. Schoepe, M. Balliu, B. C. Pierce, and A. Sabelfeld. Explicit secrecy: A policy for taint tracking. In EuroS&P, 2016.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    MOBILESoft '16: Proceedings of the International Conference on Mobile Software Engineering and Systems
    May 2016
    326 pages
    ISBN:9781450341783
    DOI:10.1145/2897073

    Copyright © 2016 Owner/Author

    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 14 May 2016

    Check for updates

    Qualifiers

    • invited-talk

    Upcoming Conference

    ICSE 2025
  • Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader