Please use this identifier to cite or link to this item: https://doi.org/10.1145/2508859.2516743
DC FieldValue
dc.titleProtecting sensitive web content from client-side vulnerabilities with CRYPTONS
dc.contributor.authorDong, X.
dc.contributor.authorChen, Z.
dc.contributor.authorSiadati, H.
dc.contributor.authorTople, S.
dc.contributor.authorSaxena, P.
dc.contributor.authorLiang, Z.
dc.date.accessioned2014-07-04T03:14:46Z
dc.date.available2014-07-04T03:14:46Z
dc.date.issued2013
dc.identifier.citationDong, X., Chen, Z., Siadati, H., Tople, S., Saxena, P., Liang, Z. (2013). Protecting sensitive web content from client-side vulnerabilities with CRYPTONS. Proceedings of the ACM Conference on Computer and Communications Security : 1311-1324. ScholarBank@NUS Repository. https://doi.org/10.1145/2508859.2516743
dc.identifier.isbn9781450324779
dc.identifier.issn15437221
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/78303
dc.description.abstractWeb browsers isolate web origins, but do not provide direct abstractions to isolate sensitive data and control computation over it within the same origin. As a result, guaranteeing security of sensitive web content requires trusting all code in the browser and client-side applications to be vulnerability-free. In this paper, we propose a new abstraction, called Crypton, which supports intra-origin control over sensitive data throughout its life cycle. To securely enforce the semantics of Cryptons, we develop a standalone component called Crypton-Kernel, which extensively leverages the functionality of existing web browsers without relying on their large TCB. Our evaluation demonstrates that the Crypton abstraction supported by the Crypton-Kernel is widely applicable to popular real-world applications with millions of users, including webmail, chat, blog applications, and Alexa Top 50 websites, with low performance overhead. © 2013 ACM.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1145/2508859.2516743
dc.sourceScopus
dc.subjectbrowser security
dc.subjectdata protection
dc.subjectweb security
dc.typeConference Paper
dc.contributor.departmentCOMPUTER SCIENCE
dc.description.doi10.1145/2508859.2516743
dc.description.sourcetitleProceedings of the ACM Conference on Computer and Communications Security
dc.description.page1311-1324
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.