Cross origin javascript capability leaks detection exploitation and defense
Download
1 / 18

Cross-Origin JavaScript Capability Leaks: Detection, Exploitation and Defense - PowerPoint PPT Presentation


  • 110 Views
  • Uploaded on

Cross-Origin JavaScript Capability Leaks: Detection, Exploitation and Defense. By Adam Barth, Joel Weinberger and Dawn Song. Overview. Current JavaScript Security Model Cross-Origin JavaScript Capability Leaks Capability Leak Detection Browser Defense Mechanism. The DOM and Access Control.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Cross-Origin JavaScript Capability Leaks: Detection, Exploitation and Defense' - cadee


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Cross origin javascript capability leaks detection exploitation and defense

Cross-Origin JavaScript Capability Leaks: Detection, Exploitation and Defense

By Adam Barth, Joel Weinberger and Dawn Song


Overview
Overview Exploitation and Defense

  • Current JavaScript Security Model

  • Cross-Origin JavaScript Capability Leaks

  • Capability Leak Detection

  • Browser Defense Mechanism


The dom and access control
The DOM and Access Control Exploitation and Defense


The dom and access control1
The DOM and Access Control Exploitation and Defense


The js engine and capabilities
The JS Engine and Capabilities Exploitation and Defense


Dom vs js engine
DOM Exploitation and Defensevs JS Engine

  • The DOM provides an access control layer

  • The JavaScript engine treats objects as capabilities


Overview1
Overview Exploitation and Defense

  • Current JavaScript Security Model

  • Cross-Origin JavaScript Capability Leaks

  • Capability Leak Detection

  • Browser Defense Mechanism


Cross context references
Cross-Context References Exploitation and Defense


Cross context references1
Cross-Context References Exploitation and Defense


Dom meets js engine
DOM meets JS Engine Exploitation and Defense


Dom meets js engine1
DOM meets JS Engine Exploitation and Defense


Overview2
Overview Exploitation and Defense

  • Current JavaScript Security Model

  • Cross-Origin JavaScript Capability Leaks

  • Capability Leak Detection

  • Browser Defense Mechanism


Javascript heap inspection
JavaScript Heap Inspection Exploitation and Defense


Instrumentation
Instrumentation Exploitation and Defense

  • In the JavaScript Engine object system

  • Object creation, destruction and reference

  • Calls into analysis library


Computing javascript contexts
Computing JavaScript Contexts Exploitation and Defense


Overview3
Overview Exploitation and Defense

  • Current JavaScript Security Model

  • Cross-Origin JavaScript Capability Leaks

  • Capability Leak Detection

  • Browser Defense Mechanism


Access control checks
Access Control Checks Exploitation and Defense


Conclusion
Conclusion Exploitation and Defense

  • Heap Graph Analysis can be used to find vulnerabilities in web browser

  • Web Browser can provide mechanism to eliminate these vulnerabilities

  • Heap Graph Tool and Access Control Prototype for WebKit:


ad