Suchergebnisse - JavaScript sandbox

  1. 1

    JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers von Xu, Guangquan, Xie, Xiaofei, Huang, Shuhan, Zhang, Jun, Pan, Lei, Lou, Wei, Liang, Kaitai

    ISSN: 1545-5971, 1941-0018
    Veröffentlicht: Washington IEEE 01.03.2022
    “… To explore the scalability of CSP, in this article, we propose JavaScript based CSP (JSCSP), which is able to support most of real-world browsers but also to generate security policies automatically …”
    Volltext
    Journal Article
  2. 2

    Securing IoT devices using JavaScript based sandbox von Sahu, Ayush, Singh, Ashima

    Veröffentlicht: IEEE 01.05.2016
    “… In this paper, we try to address the security issue by proposing JavaScript sandbox as a method to execute IoT program …”
    Volltext
    Tagungsbericht
  3. 3

    JavaScript malware behaviour analysis and detection using sandbox assisted ensemble model von Kishore, Pushkar, Barisal, Swadhin Kumar, Prasad Mohapatra, Durga

    ISSN: 2159-3450
    Veröffentlicht: IEEE 16.11.2020
    Veröffentlicht in TENCON ... IEEE Region Ten Conference (16.11.2020)
    “… In this paper, we propose a novel technique for analysing and detecting JavaScript using sandbox assisted ensemble model …”
    Volltext
    Tagungsbericht
  4. 4

    Fakeium: A dynamic execution environment for JavaScript program analysis von Moreno, José Miguel, Vallina-Rodriguez, Narseo, Tapiador, Juan

    ISSN: 2352-7110, 2352-7110
    Veröffentlicht: Elsevier B.V 01.09.2025
    Veröffentlicht in SoftwareX (01.09.2025)
    “… The JavaScript programming language, which began as a simple scripting language for the Web, has become ubiquitous, spanning desktop, mobile, and server applications …”
    Volltext
    Journal Article
  5. 5

    The Spy in the Sandbox -- Practical Cache Attacks in Javascript von Yossef Oren, Kemerlis, Vasileios P, Sethumadhavan, Simha, Keromytis, Angelos D

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 01.03.2015
    Veröffentlicht in arXiv.org (01.03.2015)
    “… We present the first micro-architectural side-channel attack which runs entirely in the browser. In contrast to other works in this genre, this attack does not …”
    Volltext
    Paper
  6. 6

    SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers von Rokicki, Thomas, Maurice, Clementine, Laperdrix, Pierre

    Veröffentlicht: IEEE 01.09.2021
    “… They rely on subtle timing differences to infer information that should not be available inside of the JavaScript sandbox …”
    Volltext
    Tagungsbericht
  7. 7

    Next-generation antivirus for JavaScript malware detection based on dynamic features von de Lima, Sidney M. L., Souza, Danilo M., Pinheiro, Ricardo P., Silva, Sthéfano H. M. T., Lopes, Petrônio G., de Lima, Rafael D. T., de Oliveira, Jemerson R., Monteiro, Thyago de A., Fernandes, Sérgio M. M., Albuquerque, Edison de Q., da Silva, Washington W. A., dos Santos, Wellington P.

    ISSN: 0219-1377, 0219-3116
    Veröffentlicht: London Springer London 01.02.2024
    Veröffentlicht in Knowledge and information systems (01.02.2024)
    “… There are many kinds of Exploit Kits, each one being built with several vulnerabilities, but almost all of them are written in JavaScript …”
    Volltext
    Journal Article
  8. 8

    A framework for leaking secrets to past instructions von Fustos, Jacob, Bechtel, Michael, Yun, Heechul

    ISSN: 2190-8508, 2190-8516
    Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.11.2022
    Veröffentlicht in Journal of cryptographic engineering (01.11.2022)
    “… Transient execution attacks use microarchitectural covert channels to leak secrets that should not have been accessible during logical program execution …”
    Volltext
    Journal Article
  9. 9

    Detection, Diagnosis and Mitigation of Malicious Javascript with Enriched Javascript Executions von Hu, Xunchao

    ISBN: 0355648652, 9780355648652
    Veröffentlicht: ProQuest Dissertations & Theses 01.01.2017
    “… Malicious JavaScript has become an important attack vector for software exploitation attacks and imposes a severe threat to computer security …”
    Volltext
    Dissertation
  10. 10

    Eloquent JavaScript: A Modern Introduction to Programming von Haverbeke, Marijn

    ISBN: 1593275846, 9781593275846
    Veröffentlicht: San Francisco No Starch Press, Incorporated 2014
    “… JavaScript lies at the heart of almost every modern web application, from social apps to the newest browser-based games …”
    Volltext
    E-Book
  11. 11

    Vulnerabilities in Android webview objects: Still not the end von El-Zawawy, Mohamed A., Losiouk, Eleonora, Conti, Mauro

    ISSN: 0167-4048, 1872-6208
    Veröffentlicht: Amsterdam Elsevier Ltd 01.10.2021
    Veröffentlicht in Computers & security (01.10.2021)
    “… Thus, while rendering web content a hybrid app can execute malicious Javascript code that can access the sensitive data on the device, bypassing the sandbox model usually adopted by standalone browsers …”
    Volltext
    Journal Article
  12. 12

    Dynamic Analysis for JavaScript Code von Gong, Liang

    ISBN: 9780438324893, 0438324897
    Veröffentlicht: ProQuest Dissertations & Theses 01.01.2018
    “… Our extension of Jalangi intercepts and rewrites JavaScript code during network transmission. We also develop NodeSec, which is a dynamic instrumentation framework that traces and sandboxes the interactions …”
    Volltext
    Dissertation
  13. 13

    ADsafety: Type-Based Verification of JavaScript Sandboxing von Joe Gibbs Politz, Eliopoulos, Spiridon, Guha, Arjun, Krishnamurthi, Shriram

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 25.06.2015
    Veröffentlicht in arXiv.org (25.06.2015)
    “… These sources must be protected from one another, which requires robust sandboxing. The many entry-points of sandboxes and the subtleties of JavaScript demand robust verification of the actual sandbox source …”
    Volltext
    Paper
  14. 14

    Hacky Racers: Exploiting Instruction-Level Parallelism to Generate Stealthy Fine-Grained Timers von Xiao, Haocheng, Ainsworth, Sam

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 26.11.2022
    Veröffentlicht in arXiv.org (26.11.2022)
    “… , even in the presence of highly restricted JavaScript sandbox environments. While such environments try to mitigate timing side channels by reducing timer precision and removing language features such as \textit{SharedArrayBuffer …”
    Volltext
    Paper
  15. 15

    Exploiting ML algorithms for Efficient Detection and Prevention of JavaScript-XSS Attacks in Android Based Hybrid Applications von Khalid, Usama, Abdullah, Muhammad, Inayat, Kashif

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 30.07.2020
    Veröffentlicht in arXiv.org (30.07.2020)
    “… WebView is an important component in hybrid mobile applications which used to implements a sandbox mechanism to protect the local resources of smartphone devices from un-authorized access of JavaScript …”
    Volltext
    Paper
  16. 16

    Transaction-based Sandboxing for JavaScript von Keil, Matthias, Thiemann, Peter

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 17.01.2017
    Veröffentlicht in arXiv.org (17.01.2017)
    “… This paper presents design and implementation of DecentJS, a language-embedded sandbox for full JavaScript …”
    Volltext
    Paper
  17. 17

    PDF Malicious Indicators Extraction Technique Based on Improved Symbolic Execution von Song, Enzhou, Hu, Tao, Yi, Peng, Wang, Wenbo

    ISSN: 1002-137X
    Veröffentlicht: Chongqing Guojia Kexue Jishu Bu 01.07.2024
    Veröffentlicht in Ji suan ji ke xue (01.07.2024)
    “… The malicious PDF document is a common attack method used by APT organizations.Analyzing extracted indicators of embedded JavaScript code is an important means to determine the maliciousness …”
    Volltext
    Journal Article
  18. 18

    TreatJS: Higher-Order Contracts for JavaScript von Keil, Matthias, Thiemann, Peter

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 30.04.2015
    Veröffentlicht in arXiv.org (30.04.2015)
    “… TreatJS is a language embedded, higher-order contract system for JavaScript which enforces contracts by run-time monitoring …”
    Volltext
    Paper
  19. 19

    TreatJS: Higher-Order Contracts for JavaScript (Artifact) von Keil, Matthias, Thiemann, Peter

    ISSN: 2509-8195
    Veröffentlicht: Schloss Dagstuhl – Leibniz-Zentrum für Informatik 30.10.2015
    “… TreatJS is a language embedded, higher-order contract system for JavaScript which enforces contracts by run-time monitoring …”
    Volltext
    Datensatz
  20. 20

    Adobe Zero-Day Attack Bypasses Sandbox von Schwartz, Mathew J

    ISSN: 1938-3371
    Veröffentlicht: London Informa 14.02.2013
    Veröffentlicht in Informationweek - Online (14.02.2013)
    Volltext
    Trade Publication Article