Search Results - untrusted JavaScript code~

Search alternatives:

Refine Results
  1. 1

    A client‐server JavaScript code rewriting‐based framework to detect the XSS worms from online social network by Gupta, Shashank, Gupta, B.B., Chaudhary, Pooja

    ISSN: 1532-0626, 1532-0634
    Published: Hoboken Wiley Subscription Services, Inc 10.11.2019
    Published in Concurrency and computation (10.11.2019)
    “… This shifting is done for completely isolating the untrusted JavaScript code and data. The client‐side performs runtime monitoring of the dynamic JavaScript code to recognize the tainted flow of untrusted JavaScript variables…”
    Get full text
    Journal Article
  2. 2

    Jailed JavaScript library runs untrusted code safely in browsers, Node.js by Yegulalp, Serdar

    Published: San Mateo Foundry 13.06.2016
    Published in InfoWorld.com (13.06.2016)
    “… ] Jailed, written by JavaScript developer Dmitry Prokashev, uses native JavaScript functions to load a set of JavaScript code into a sandboxed environment and export functions to the outside world…”
    Get full text
    Trade Publication Article
  3. 3

    Automated Analysis of Security-Critical JavaScript APIs by Taly, A., Erlingsson, Mitchell, J. C., Miller, M. S., Nagra, J.

    ISBN: 1457701472, 9781457701474
    ISSN: 1081-6011
    Published: IEEE 01.05.2011
    “… To provide services ranging from maps to advertisements, Web applications may incorporate untrusted JavaScript code from third parties…”
    Get full text
    Conference Proceeding
  4. 4

    A Large Scale Analysis of Android — Web Hybridization by Tiwari, Abhishek, Prakash, Jyoti, Groß, Sascha, Hammer, Christian

    ISSN: 0164-1212
    Published: Elsevier Inc 01.12.2020
    Published in The Journal of systems and software (01.12.2020)
    “…Many Android applications embed webpages via WebView components and execute JavaScript code within Android…”
    Get full text
    Journal Article
  5. 5

    HybriDroid: Static analysis framework for Android hybrid applications by Sungho Lee, Dolby, Julian, Sukyoung Ryu

    Published: ACM 01.09.2016
    “… Moreover, because untrusted JavaScript code may access device-specific features via native code, hybrid apps may be vulnerable to various security attacks…”
    Get full text
    Conference Proceeding
  6. 6

    XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud by Gupta, Shashank, Gupta, B. B.

    ISSN: 1380-7501, 1573-7721
    Published: New York Springer US 01.02.2018
    Published in Multimedia tools and applications (01.02.2018)
    “… It operates in two modes: training and detection mode. The former mode sanitizes the extracted untrusted variables of JavaScript code in a context-aware manner…”
    Get full text
    Journal Article
  7. 7

    Lightweight Enforcement of Fine-grained Security Policies for Untrusted Software by Phung, Phu H

    ISBN: 1392367204, 9781392367209
    Published: ProQuest Dissertations & Theses 01.01.2011
    “…This thesis presents an innovative approach to implementing a security enforcement mechanism in the contexts of untrusted software systems, where a piece of code in a base system may come from an untrusted third party…”
    Get full text
    Dissertation
  8. 8

    LUDroid: A Large Scale Analysis of Android - Web Hybridization by Tiwari, Abhishek, Prakash, Jyoti, Gross, Sascha, Hammer, Christian

    ISSN: 2470-6892
    Published: IEEE 01.09.2019
    “…Many Android applications embed webpages via WebView components and execute JavaScript code within Android…”
    Get full text
    Conference Proceeding
  9. 9

    NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation by Ntantogian, Christoforos, Bountakas, Panagiotis, Antonaropoulos, Dimitris, Patsakis, Constantinos, Xenakis, Christos

    ISSN: 2214-2126
    Published: Elsevier Ltd 01.05.2021
    “…; Node.js is no exception, as Server-Side JavaScript Injection (SSJI) attacks are possible due to the use of vulnerable functions and neglecting to sanitize data input provided by untrusted sources…”
    Get full text
    Journal Article
  10. 10

    Language-Based Isolation of Untrusted JavaScript by Maffeis, S., Taly, A.

    ISBN: 076953712X, 9780769537122
    ISSN: 1063-6900
    Published: IEEE 01.07.2009
    “… We study language-based methods for filtering and rewriting JavaScript code, using Yahoo…”
    Get full text
    Conference Proceeding
  11. 11

    Sandboxing Untrusted JavaScript by Taly, Ankur

    ISBN: 9798662531406
    Published: ProQuest Dissertations & Theses 01.01.2013
    “… Such third-party content often comprises of executable code, commonly written in JavaScript, that runs together with Web site's code in the user's browser…”
    Get full text
    Dissertation
  12. 12
  13. 13

    Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network by Gupta, Shashank, Gupta, B.B., Chaudhary, Pooja

    ISSN: 0167-739X, 1872-7115
    Published: Elsevier B.V 01.02.2018
    Published in Future generation computer systems (01.02.2018)
    “… The online mode detects the injection of untrusted script content in the DOM tree generated at runtime…”
    Get full text
    Journal Article
  14. 14

    Detecting XSS Attack Using Principal Component Analysis And Naive Bayesian Techniques by Nagham kamil albusalih, Rana jumaa aljanabi

    ISSN: 1303-5150
    Published: Bornova Izmir NeuroQuantology 01.01.2022
    Published in NeuroQuantology (01.01.2022)
    “… This malicious script is made of JavaScript code and is injected into the web application's untrusted input data…”
    Get full text
    Journal Article
  15. 15

    InspectJS: Leveraging Code Similarity and User-Feedback for Effective Taint Specification Inference for JavaScript by Dutta, Saikat, Garbervetsky, Diego, Lahiri, Shuvendu K., Schafer, Max

    Published: IEEE 01.05.2022
    “… Taint analysis in particular is a very general and powerful technique, where security policies are expressed in terms of forbidden flows, either from untrusted input sources to sensitive sinks…”
    Get full text
    Conference Proceeding
  16. 16

    Dynamic information flow analysis for JavaScript in a web browser by Austin, Thomas H

    ISBN: 9781303020971, 1303020971
    Published: ProQuest Dissertations & Theses 01.01.2013
    “…JavaScript has become a central technology of the web, but it is also the source of many security problems, including cross-site scripting attacks and malicious advertising code…”
    Get full text
    Dissertation
  17. 17

    WebC: toward a portable framework for deploying legacy code in web browsers by Yin, Jie, Tan, Gang, Bai, XiaoLong, Hu, ShiMin

    ISSN: 1674-733X, 1869-1919
    Published: Beijing Science China Press 01.07.2015
    Published in Science China. Information sciences (01.07.2015)
    “…For security, most web applications are developed in some type-safe language, such as JavaScript or Java…”
    Get full text
    Journal Article
  18. 18

    A Large Scale Analysis of Android-Web Hybridization by Tiwari, Abhishek, Prakash, Jyoti, Gross, Sascha, Hammer, Christian

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 05.08.2020
    Published in arXiv.org (05.08.2020)
    “…Many Android applications embed webpages via WebView components and execute JavaScript code within Android…”
    Get full text
    Paper
  19. 19

    CSSXC: Context-sensitive Sanitization Framework for Web Applications against XSS Vulnerabilities in Cloud Environments by Gupta, Shashank, Gupta, B.B.

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2016
    Published in Procedia computer science (2016)
    “… the sanitizers on the untrusted variables of web application. The XSS attack mitigation capability of our framework was evaluated on web applications deployed for the cloud users in the cloud environment…”
    Get full text
    Journal Article
  20. 20

    ESFuzzer: An Efficient Way to Fuzz WebAssembly Interpreter by Han, Jideng, Zhang, Zhaoxin, Du, Yuejin, Wang, Wei, Chen, Xiuyuan

    ISSN: 2079-9292, 2079-9292
    Published: Basel MDPI AG 01.04.2024
    Published in Electronics (Basel) (01.04.2024)
    “… This enables the execution of untrusted code in a web browser without compromising the security and integrity of the user’s system…”
    Get full text
    Journal Article