Vaibhav Rastogi and Yi Yang.  Web 2.0 – rich applications  A website hosts content it may not be responsible for  Third party gadgets  Third party.

Slides:



Advertisements
Similar presentations
Presented by Vaibhav Rastogi. Current browsers try to separate host system from Web Websites evolved into web applications Lot of private data on the.
Advertisements

Cross-Site Scripting (XSS) Vulnerability in AJAX and Adobe Flex Applications Danielle Cauthen 04/09/2010 COMS E6125 – Web enHanced Information Management.
Copyright © 2004 ProsoftTraining, All Rights Reserved. Lesson 11: Advanced Web Technologies.
JavaScript and AJAX Jonathan Foss University of Warwick
JavaScript FaaDoOEngineers.com FaaDoOEngineers.com.
Digital Infrastructures for Humanities Research Matthew Milner Assistant Director McGill Digital Humanities institute Edward Bilodeau.
Presented by Vaibhav Rastogi.  Advent of Web 2.0 and Mashups  Inclusion of untrusted third party content a necessity  Need to restrict the functionality.
An Evaluation of the Google Chrome Extension Security Architecture
Team Members: Brad Stancel,
To. An easy way to explain the internet is to think of your school computers all linked together into a network that you can put information into.
Warning Ahead: Security Storms are Brewing in Your JavaScript Maty Siman.
Web Security Model CSE 591 – Security and Vulnerability Analysis Spring 2015 Adam Doupé Arizona State University
Lecture 3B: Client-Side Scripting IT 202—Internet Applications Based on notes developed by Morgan Benton.
Mobile Code and Worms By Mitun Sinha Pandurang Kamat 04/16/2003.
XP Tutorial 9 New Perspectives on JavaScript, Comprehensive1 Working with Cookies Managing Data in a Web Site Using JavaScript Cookies.
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
Lab 3 Cookie Stealing using XSS Kara James, Chelsea Collins, Trevor Norwood, David Johnson.
JavaScript Debugging, Diagnostic Web Tools and Firefox Add-ons By Gennady Feldman March 12, 2008 April 9, 2008 At The WebTechNY.com User Group.
Public Key Infrastructure Ammar Hasayen ….
 A cookie is a piece of text that a Web server can store on a user's hard disk.  Cookie data is simply name-value pairs stored on your hard disk by.
Introduction to InfoSec – Recitation 10 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Is Your Website Hackable? Check with Acunetix Web Vulnerability Scanner. Acunetix Web Vulnerability Scanner V9.
4.1 JavaScript Introduction
BLUEPRINT: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers Mike Ter Louw, V.N. Venkatakrishnan University of Illinois at Chicago.
Working with Cookies Managing Data in a Web Site Using JavaScript Cookies* *Check and comply with the current legislation regarding handling cookies.
 2008 Pearson Education, Inc. All rights reserved Ajax-Enabled Rich Internet Applications.
CNIT 133 Interactive Web Pags – JavaScript and AJAX JavaScript Environment.
Web Programming: Client/Server Applications Server sends the web pages to the client. –built into Visual Studio for development purposes Client displays.
Chapter 8 Cookies And Security JavaScript, Third Edition.
Cross Site Integration “mashups” cross site scripting.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 RubyJax Brent Morris/
2006 Adobe Systems Incorporated. All Rights Reserved. 1 Adobe RIA Technologies: Adobe Flex 3 Cornel Creanga Platform Evangelist
Modern JavaScript Develop And Design Instructor’s Notes Chapter 1 - (Re) Introducing JavaScript Modern JavaScript Design And Develop Copyright © 2012 by.
INTRODUCTION TO WEB APPLICATION Chapter 1. In this chapter, you will learn about:  The evolution of the Internet  The beginning of the World Wide Web,
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Cascading Style Sheets CSS. Source W3Schools
University of Central Florida The Postman Always Rings Twice: Attacking & Defending postMessage in HTML5 Websites Ankur Verma University of Central Florida,
Vaibhav Rastogi and Yi Yang.  SOP is outdated  Netscape introduced this policy when most content on the Internet was static  Differences amongst different.
Protecting Browsers from Extension Vulnerabilities Paper by: Adam Barth, Adrienne Porter Felt, Prateek Saxena at University of California, Berkeley and.
Presented By: Chandra Kollipara. Cross-Site Scripting: Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected.
Web Security Lesson Summary ●Overview of Web and security vulnerabilities ●Cross Site Scripting ●Cross Site Request Forgery ●SQL Injection.
JavaScript Introduction. Slide 2 Lecture Overview JavaScript background The purpose of JavaScript A first JavaScript example Introduction to getElementById.
Understanding Web Applications Lesson 4. Objective Domain Matrix Skills/ConceptsMTA Exam Objectives Understanding Web Page Development Understand Web.
1 Isolating Web Programs in Modern Browser Architectures CS6204: Cloud Environment Spring 2011.
Trevor Jim Nikhil Swamy Michael Hicks Defeating Script Injection Attacks with Browser-Enforced Embedded Policies Jason FroehlichSeptember 24, 2008.
 Web pages originally static  Page is delivered exactly as stored on server  Same information displayed for all users, from all contexts  Dynamic.
INTRODUCTION TO HTML5 New HTML5 User Interface and Attributes.
Dr. Abdullah Almutairi Spring PHP is a server scripting language, and a powerful tool for making dynamic and interactive Web pages. PHP is a widely-used,
Overview Web Technologies Computing Science Thompson Rivers University.
JavaScript and Ajax (JavaScript Environment) Week 6 Web site:
By Collin Donaldson. Hacking is only legal under the following circumstances: 1.You hack (penetration test) a device/network you own. 2.You gain explicit,
The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites Paper by Sooel Son and Vitaly Shmatikov, The University of Texas.
MICROSOFT AJAX CDN (CONTENT DELIVERY NETWORK) Make Your ASP.NET site faster to retrieve.
Web Page Design The Basics. The Web Page A document (file) created using the HTML scripting language. A document (file) created using the HTML scripting.
Group 18: Chris Hood Brett Poche
Web Technologies Computing Science Thompson Rivers University
World Wide Web policy.
Static Detection of Cross-Site Scripting Vulnerabilities
Web Systems & Technologies
04 | Web Applications Gerry O’Brien | Technical Content Development Manager Paul Pardi | Senior Content Publishing Manager.
CSC 495/583 Topics of Software Security Intro to Web Security
JAVASCRIPT Pam Kahl | COM 585 | Spring 2010.
AngularJS and SharePoint I Chris Douglas Senior SharePoint Developer ECS Web:
Architecture of the web
Web Technologies Computing Science Thompson Rivers University
Client-Server Model: Requesting a Web Page
Cross-Site Scripting Attack (XSS)
Cross Site Request Forgery (CSRF)
Mike Ter Louw, V.N. Venkatakrishnan University of Illinois at Chicago
Presentation transcript:

Vaibhav Rastogi and Yi Yang

 Web 2.0 – rich applications  A website hosts content it may not be responsible for  Third party gadgets  Third party libraries  2 websites want to enable sharing of a script  Allow a script hosted on one site access other scripts

 SOP is outdated  Netscape introduced this policy when most content on the Internet was static  Differences amongst different resources leads to vulnerabilities  Design a new framework to capture finer grained origins and sharing

 The mechanism for sharing should  Same for all resources  Extensible to new resources  Current consideration of resources  DOM objects  Cookies  Network access – AJAX  JavaScript functionality  Others such as display, clipboard, history

 Origins depicted by   Allow origins to be specified at arbitrary levels of granularity  In HTML, originID may be included as attributes …  With each origin is a policy file associated with a server

 If no origins are specified the default is the prevalent Same Origin Policy  Current websites do not break  An origin is inherited from the parent if no origin is specified

 Server side resources  HTML, CSS, JavaScript  Server supplies the originIDs and policies  Generated resources  DOM and JS objects  AJAX  Origins normally inherited from server side resources ▪ More finer grained policies may still be specified

 Finer grained origins  No XSS  The default policies of not associating any origin with a script makes XSS impossible

 Tamper proof  Non forgeable  Attacker should not be able to change or add origins  Non repudiation  Host cannot repudiate setting up of origins  May not be required

 Public Key Infrastructure  Similar to SSL  MAC(resource|originID) specifies the actual origin  Heavy weight  Requires every website to use SSL type PKI

 What makes a good string representation of a resource?  Do policy files themselves need to be secured?