Výsledky vyhledávání - JavaScript sandbox

  1. 1

    JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers Autor Xu, Guangquan, Xie, Xiaofei, Huang, Shuhan, Zhang, Jun, Pan, Lei, Lou, Wei, Liang, Kaitai

    ISSN: 1545-5971, 1941-0018
    Vydáno: Washington IEEE 01.03.2022
    “… To explore the scalability of CSP, in this article, we propose JavaScript based CSP (JSCSP), which is able to support most of real-world browsers but also to generate security policies automatically…”
    Získat plný text
    Journal Article
  2. 2

    Securing IoT devices using JavaScript based sandbox Autor Sahu, Ayush, Singh, Ashima

    Vydáno: IEEE 01.05.2016
    “… In this paper, we try to address the security issue by proposing JavaScript sandbox as a method to execute IoT program…”
    Získat plný text
    Konferenční příspěvek
  3. 3

    JavaScript malware behaviour analysis and detection using sandbox assisted ensemble model Autor Kishore, Pushkar, Barisal, Swadhin Kumar, Prasad Mohapatra, Durga

    ISSN: 2159-3450
    Vydáno: IEEE 16.11.2020
    Vydáno v TENCON ... IEEE Region Ten Conference (16.11.2020)
    “… In this paper, we propose a novel technique for analysing and detecting JavaScript using sandbox assisted ensemble model…”
    Získat plný text
    Konferenční příspěvek
  4. 4

    Fakeium: A dynamic execution environment for JavaScript program analysis Autor Moreno, José Miguel, Vallina-Rodriguez, Narseo, Tapiador, Juan

    ISSN: 2352-7110, 2352-7110
    Vydáno: Elsevier B.V 01.09.2025
    Vydáno v SoftwareX (01.09.2025)
    “…The JavaScript programming language, which began as a simple scripting language for the Web, has become ubiquitous, spanning desktop, mobile, and server applications…”
    Získat plný text
    Journal Article
  5. 5

    The Spy in the Sandbox -- Practical Cache Attacks in Javascript Autor Yossef Oren, Kemerlis, Vasileios P, Sethumadhavan, Simha, Keromytis, Angelos D

    ISSN: 2331-8422
    Vydáno: Ithaca Cornell University Library, arXiv.org 01.03.2015
    Vydáno v arXiv.org (01.03.2015)
    “…We present the first micro-architectural side-channel attack which runs entirely in the browser. In contrast to other works in this genre, this attack does not…”
    Získat plný text
    Paper
  6. 6

    SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers Autor Rokicki, Thomas, Maurice, Clementine, Laperdrix, Pierre

    Vydáno: IEEE 01.09.2021
    “… They rely on subtle timing differences to infer information that should not be available inside of the JavaScript sandbox…”
    Získat plný text
    Konferenční příspěvek
  7. 7
  8. 8

    A framework for leaking secrets to past instructions Autor Fustos, Jacob, Bechtel, Michael, Yun, Heechul

    ISSN: 2190-8508, 2190-8516
    Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.11.2022
    Vydáno v Journal of cryptographic engineering (01.11.2022)
    “…Transient execution attacks use microarchitectural covert channels to leak secrets that should not have been accessible during logical program execution…”
    Získat plný text
    Journal Article
  9. 9

    Detection, Diagnosis and Mitigation of Malicious Javascript with Enriched Javascript Executions Autor Hu, Xunchao

    ISBN: 0355648652, 9780355648652
    Vydáno: ProQuest Dissertations & Theses 01.01.2017
    “…Malicious JavaScript has become an important attack vector for software exploitation attacks and imposes a severe threat to computer security…”
    Získat plný text
    Dissertation
  10. 10

    Eloquent JavaScript: A Modern Introduction to Programming Autor Haverbeke, Marijn

    ISBN: 1593275846, 9781593275846
    Vydáno: San Francisco No Starch Press, Incorporated 2014
    “…JavaScript lies at the heart of almost every modern web application, from social apps to the newest browser-based games…”
    Získat plný text
    E-kniha
  11. 11

    Vulnerabilities in Android webview objects: Still not the end Autor El-Zawawy, Mohamed A., Losiouk, Eleonora, Conti, Mauro

    ISSN: 0167-4048, 1872-6208
    Vydáno: Amsterdam Elsevier Ltd 01.10.2021
    Vydáno v Computers & security (01.10.2021)
    “… Thus, while rendering web content a hybrid app can execute malicious Javascript code that can access the sensitive data on the device, bypassing the sandbox model usually adopted by standalone browsers…”
    Získat plný text
    Journal Article
  12. 12

    Dynamic Analysis for JavaScript Code Autor Gong, Liang

    ISBN: 9780438324893, 0438324897
    Vydáno: ProQuest Dissertations & Theses 01.01.2018
    “… Our extension of Jalangi intercepts and rewrites JavaScript code during network transmission. We also develop NodeSec, which is a dynamic instrumentation framework that traces and sandboxes the interactions…”
    Získat plný text
    Dissertation
  13. 13

    ADsafety: Type-Based Verification of JavaScript Sandboxing Autor Joe Gibbs Politz, Eliopoulos, Spiridon, Guha, Arjun, Krishnamurthi, Shriram

    ISSN: 2331-8422
    Vydáno: Ithaca Cornell University Library, arXiv.org 25.06.2015
    Vydáno v arXiv.org (25.06.2015)
    “… These sources must be protected from one another, which requires robust sandboxing. The many entry-points of sandboxes and the subtleties of JavaScript demand robust verification of the actual sandbox source…”
    Získat plný text
    Paper
  14. 14

    Hacky Racers: Exploiting Instruction-Level Parallelism to Generate Stealthy Fine-Grained Timers Autor Xiao, Haocheng, Ainsworth, Sam

    ISSN: 2331-8422
    Vydáno: Ithaca Cornell University Library, arXiv.org 26.11.2022
    Vydáno v arXiv.org (26.11.2022)
    “…, even in the presence of highly restricted JavaScript sandbox environments. While such environments try to mitigate timing side channels by reducing timer precision and removing language features such as \textit{SharedArrayBuffer…”
    Získat plný text
    Paper
  15. 15

    Exploiting ML algorithms for Efficient Detection and Prevention of JavaScript-XSS Attacks in Android Based Hybrid Applications Autor Khalid, Usama, Abdullah, Muhammad, Inayat, Kashif

    ISSN: 2331-8422
    Vydáno: Ithaca Cornell University Library, arXiv.org 30.07.2020
    Vydáno v arXiv.org (30.07.2020)
    “… WebView is an important component in hybrid mobile applications which used to implements a sandbox mechanism to protect the local resources of smartphone devices from un-authorized access of JavaScript…”
    Získat plný text
    Paper
  16. 16

    Transaction-based Sandboxing for JavaScript Autor Keil, Matthias, Thiemann, Peter

    ISSN: 2331-8422
    Vydáno: Ithaca Cornell University Library, arXiv.org 17.01.2017
    Vydáno v arXiv.org (17.01.2017)
    “… This paper presents design and implementation of DecentJS, a language-embedded sandbox for full JavaScript…”
    Získat plný text
    Paper
  17. 17

    PDF Malicious Indicators Extraction Technique Based on Improved Symbolic Execution Autor Song, Enzhou, Hu, Tao, Yi, Peng, Wang, Wenbo

    ISSN: 1002-137X
    Vydáno: Chongqing Guojia Kexue Jishu Bu 01.07.2024
    Vydáno v Ji suan ji ke xue (01.07.2024)
    “…The malicious PDF document is a common attack method used by APT organizations.Analyzing extracted indicators of embedded JavaScript code is an important means to determine the maliciousness…”
    Získat plný text
    Journal Article
  18. 18

    TreatJS: Higher-Order Contracts for JavaScript Autor Keil, Matthias, Thiemann, Peter

    ISSN: 2331-8422
    Vydáno: Ithaca Cornell University Library, arXiv.org 30.04.2015
    Vydáno v arXiv.org (30.04.2015)
    “…TreatJS is a language embedded, higher-order contract system for JavaScript which enforces contracts by run-time monitoring…”
    Získat plný text
    Paper
  19. 19

    TreatJS: Higher-Order Contracts for JavaScript (Artifact) Autor Keil, Matthias, Thiemann, Peter

    ISSN: 2509-8195
    Vydáno: Schloss Dagstuhl – Leibniz-Zentrum für Informatik 30.10.2015
    “…TreatJS is a language embedded, higher-order contract system for JavaScript which enforces contracts by run-time monitoring…”
    Získat plný text
    Soubor dat
  20. 20

    Adobe Zero-Day Attack Bypasses Sandbox Autor Schwartz, Mathew J

    ISSN: 1938-3371
    Vydáno: London Informa 14.02.2013
    Vydáno v Informationweek - Online (14.02.2013)
    Získat plný text
    Trade Publication Article