Back to Search Start Over

Improving web site security with data flow management

Authors :
Robert T. Morris and Nickolai Zeldovich.
Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science.
Yip, Alexander Siumann, 1979
Robert T. Morris and Nickolai Zeldovich.
Massachusetts Institute of Technology. Dept. of Electrical Engineering and Computer Science.
Yip, Alexander Siumann, 1979
Publication Year :
2010

Abstract

Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009.<br />Cataloged from PDF version of thesis.<br />Includes bibliographical references (p. 91-98).<br />This dissertation describes two systems, RESIN and BFLow, whose goal is to help Web developers build more secure Web sites. RESIN and BFLOW use data flow management to help reduce the security risks of using buggy or malicious code. RESIN provides programmers with language-level mechanisms to track and manage the flow of data within the server. These mechanisms make it easy for programmers to catch server-side data flow bugs that result in security vulnerabilities, and prevent these bugs from being exploited. BFLow is a system that adds information flow control, a restrictive form of data flow management, both to the Web browser and to the interface between a browser and a server. BFLOW makes it possible for a Web site to combine confidential data with untrusted JavaScript in its Web pages, without risking leaks of that data. This work makes a number of contributions. RESIN introduces the idea of a data flow assertion and demonstrates how to build them using three language-level mechanisms, policy objects, data tracking, and filter objects. We built prototype implementations of RESIN in both the PHP and Python runtimes. We adapt seven real off-the-shelf applications and implement 11 different security policies in RESIN which thwart at least 27 real security vulnerabilities. BFLow introduces an information flow control model that fits the JavaScript communication mechanisms, and a system that maps that model to JavaScript's existing isolation system.<br />(cont.) Together, these techniques allow untrusted JavaScript to read, compute with, and display confidential data without the risk of leaking that data, yet requires only minor changes to existing software. We built a prototype of the BFLow system and three different applications including a social networking application, a novel shared-data Web platform, and BFlogger, a third-party JavaScript platform similar to that of Blogger.com. We ported several untrusted JavaScript extensions from Blogger.com to BFlogger, and show that the extensions cannot leak data as they can in Blogger.com.<br />by Alexander Siumann Yip.<br />Ph.D.

Details

Database :
OAIster
Notes :
98 p., application/pdf, English
Publication Type :
Electronic Resource
Accession number :
edsoai.on1139043650
Document Type :
Electronic Resource