[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1367497.1367570acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article

SMash: secure component model for cross-domain mashups on unmodified browsers

Published: 21 April 2008 Publication History

Abstract

Mashup applications mix and merge content (data and code) from multiple content providers in a user's browser, to provide high-value web applications that can rival the user experience provided by desktop applications. Current browser security models were not designed to support such applications and they are therefore implemented with insecure workarounds. In this paper, we present a secure component model, where components are provided by different trust domains, and can interact using a communication abstraction that allows ease of specification of a security policy. We have developed an implementation of this model that works currently in all major browsers, and addresses challenges of communication integrity and frame-phishing. An evaluation of the performance of our implementation shows that this approach is not just feasible but also practical.

References

[1]
OpenAjax Alliance Open Source Project. http://openajaxallianc.sourceforge.net.
[2]
A. Barth and C. Jackson. Protecting browsers from frame hijacking attacks. http://crypto.stanford.edu/frames/.
[3]
M. Y. Becker, C. Fournet, and A. D. Gordon. SecPAL: Design and semantics of a decentralized authorization language. Technical Report MSR-TR-2006-120, Microsoft Research, Sept. 2006.
[4]
J. Burke. Cross domain frame communication with fragment identifiers. http://tagneto.blogspot.com/2006/06/cross-domain-frame-communication-with.html, June 2006.
[5]
D. Crockford. The (module) tag. http://www.json.org/module.html, Oct. 2006.
[6]
R. Dhamija, J. Tygar, and M. Hearst. Why phishing works. In Conference on Human Factors in Computing Systems (CHI 2006), 2006.
[7]
Dojo Foundation. Dojo javascript toolkit. http://www.dojotoolkit.org/.
[8]
Google. Gadget-to-gadget communication. http://www.google.com/apis/gadgets/pubsub.html.
[9]
Google. Google account authentication (AuthSub). http://code.google.com/apis/accounts/AuthForWebApps.html.
[10]
I. Hickson (Editor). HTML 5. Technical report, Web Hypertext Application Technology Working Group HTML 5, 2007. Working Draft, http://www.whatwg.org/specs/web-apps/current-work.
[11]
J. Howell, C. Jackson, H. J. Wang, and X. Fan. MashupOS: Operating system abstractions for client mashups. In Proceedings of HotOS XI: The 11th Workshop on Hot Topics in Operating Systems. USENIX, May 2007.
[12]
C. Jackson and H. Wang. Subspace: Secure cross-domain communication for web mashups. In 16th International Conference on the World-Wide Web, 2007.
[13]
G. Lee. Personal communication on XDDE. http://www.openspot.com, 2007.
[14]
B. McLaughlin. Mastering Ajax. IBM developerWorks, 2005 - 2007. http://www-128.ibm.com/developerworks/views/web/libraryview.jsp?search_by=Mastering+Ajax+Part.
[15]
Microsoft. Windows cardspace. http://cardspace.netfx3.com, http://www.identityblog.com.
[16]
M. S. Miller, M. Samuel, B. Laurie, I. Awad, and M. Stay. Caja - safe active content in sanitized Javascript. http://google-caja.googlecode.com/files/caja-spec-2007-10-11.pdf, Oct. 2007.
[17]
Mozilla.org. The same origin policy. http://www.mozilla.org/projects/security/components/same-origin.html.
[18]
D. Parnas. On the criteria to be used in decomposing systems into modules. Communications of the ACM, 15(12):1053--1058, Dec. 1972.
[19]
D. Raggett, H. Le Arnaud, and I. Jacobs (Editors). HyperText Markup Language (HTML). W3C Recommendation 4.01, W3C, Dec, Dec. 1999.
[20]
C. Reis, J. Dunagan, H. J. Wang, O. Dubrovsky, and S. Esmeir. BrowserShield: Vulnerability-driven filtering of dynamic HTML. In Proceedings of the Sixth Symposium on Operating Systems Design and Implementation, Nov. 2006.
[21]
A. Russel, D. Davis, G. Wilkins, and M. Nesbitt. Bayeux protocol. Technical Report 1.0draft0, Dojo Foundation, 2007.
[22]
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278--1308, Sept. 1975.
[23]
K. Spett. Cross-site scripting - are your web applications vulnerable? Technical report, SPI Dynamics, 2005. http://www.spidynamics.com/whitepapers/SPIcross-sitescripting.pdf.
[24]
Teknikill, Shadowcat Systems, and SitePen, Inc. Cometd. http://www.cometd.com/.
[25]
K. Vikram and M. Steiner. Mashup component isolation via server-side analysis and instrumentation. In Web 2.0 Security & Privacy Workshop. IEEE Computer Society, Technical Committee on Security and Privacy, 2007.
[26]
World Wide Web Consortium. Document Object Model. http://www.w3.org/DOM/.
[27]
Yahoo! Browser-based authentication (BBAuth). http://developer.yahoo.com/auth/.
[28]
K.-P. Yee and K. Sitaker. Passpet: Convenient password management and phishing protection. In Symposium On Usable Privacy and Security, 2006.
[29]
D. Yu, A. Chander, N. Islam, and I. Serikov. JavaScript instrumentation for browser security. In 34st ACM Symposium on Principles of Programming Languages (POPL), pages 237--249, 2007.
[30]
K. Zyp. CrossSafe. http://code.google.com/p/crosssafe/.

Cited By

View all
  • (2023)Teaching Business Skills in the Cloud: A Process Model for Cloud-Based Enterprise Software Integration in Higher Education2023 IEEE Global Engineering Education Conference (EDUCON)10.1109/EDUCON54358.2023.10125159(1-9)Online publication date: 1-May-2023
  • (2022)SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP53844.2022.00021(206-222)Online publication date: Jun-2022
  • (2021)JSISOLATE: lightweight in-browser JavaScript isolationProceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3468264.3468577(193-204)Online publication date: 20-Aug-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WWW '08: Proceedings of the 17th international conference on World Wide Web
April 2008
1326 pages
ISBN:9781605580852
DOI:10.1145/1367497
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 April 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. browser
  2. component model
  3. mashup
  4. phishing
  5. web 2.0

Qualifiers

  • Research-article

Conference

WWW '08
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)0
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Teaching Business Skills in the Cloud: A Process Model for Cloud-Based Enterprise Software Integration in Higher Education2023 IEEE Global Engineering Education Conference (EDUCON)10.1109/EDUCON54358.2023.10125159(1-9)Online publication date: 1-May-2023
  • (2022)SoK: All or Nothing - A Postmortem of Solutions to the Third-Party Script Inclusion Permission Model and a Path Forward2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP53844.2022.00021(206-222)Online publication date: Jun-2022
  • (2021)JSISOLATE: lightweight in-browser JavaScript isolationProceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3468264.3468577(193-204)Online publication date: 20-Aug-2021
  • (2015)Password Meters and Generators on the WebProceedings of the 5th ACM Conference on Data and Application Security and Privacy10.1145/2699026.2699118(253-262)Online publication date: 2-Mar-2015
  • (2015)Model-driven web applications2015 Science and Information Conference (SAI)10.1109/SAI.2015.7237258(954-964)Online publication date: Jul-2015
  • (2015)QFL for the Web Data Extraction from Multiple Data SourcesProceedings of the 2015 International Conference on Computing Communication Control and Automation10.1109/ICCUBEA.2015.90(432-436)Online publication date: 26-Feb-2015
  • (2015)Securing a Loosely-Coupled Web-Based eLearning Ecosystem Combining Open StandardsWeb Information Systems and Technologies10.1007/978-3-319-27030-2_4(48-62)Online publication date: 16-Dec-2015
  • (2015)Privacy-preserving authorization method for mashupsSecurity and Communication Networks10.1002/sec.13228:18(4421-4435)Online publication date: 1-Dec-2015
  • (2014)PivotProceedings of the 2014 IEEE Symposium on Security and Privacy10.1109/SP.2014.24(261-275)Online publication date: 18-May-2014
  • (2014)Cooperative distributed architecture for mashupsEnterprise Information Systems10.1080/17517575.2013.8390548:3(406-444)Online publication date: 1-May-2014
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media