Building Secure Web Applications with Automatic Partitioning

被引:13
|
作者
Chong, Stephen [1 ]
Liu, Jed [1 ]
Myers, Andrew C. [1 ]
Qi, Xin [1 ]
Vikram, K. [1 ]
Zheng, Lantian [1 ]
Zheng, Xin [1 ]
机构
[1] Cornell Univ, Dept Comp Sci, Ithaca, NY 14853 USA
关键词
D O I
10.1145/1461928.1461949
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Swift is a new, principled approach to building Web applications that are secure by construction. Modern Web applications typically implement some functionality as client-side JavaScript code, for improved interactivity. Moving code and data to the client can create security vulnerabilities, but currently there are no good methods for deciding when it is secure to do so. Swift automatically partitions application code while providing assurance that the resulting placement is secure and efficient. Application code is written as Java-like code annotated with information flow policies that specify the confidentiality and integrity of Web application information. The compiler uses these policies to automatically partition the program into JavaScript code running in the client browser and Java code running on the server. To improve interactive performance, code and data are placed on the client. However, security-critical code and data are always placed on the server. The compiler may also automatically replicate code across the client and server, to obtain both security and performance.
引用
收藏
页码:79 / 87
页数:9
相关论文
共 50 条
  • [21] Partitioning of web applications for hybrid cloud deployment
    Kaviani, Nima
    Wohlstadter, Eric
    Lea, Rodger
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2014, 5 (05) : 1 - 17
  • [23] AProSec: An aspect for programming secure Web applications
    Hermosillo, Gabriel
    Gomez, Roberto
    Seinturier, Lionel
    Duchien, Laurence
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 1026 - +
  • [24] Deploying Secure Web Applications with OWASP Resources
    Cerullo, Fabio E.
    WEB APPLICATION SECURITY, 2010, 72 : 21 - 21
  • [25] Tutorial: Building Secure and Trustworthy Blockchain Applications
    Cai, Chengjun
    Duan, Huayi
    Wang, Cong
    2018 IEEE CYBERSECURITY DEVELOPMENT CONFERENCE (SECDEV 2018), 2018, : 120 - 121
  • [26] An Automatic Vulnerability Scanner for Web Applications
    Chen, Haibo
    Chen, Junzuo
    Chen, Jinfu
    Yin, Shang
    Wu, Yiming
    Xu, Jiaping
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1519 - 1524
  • [27] Automatic Model Completion for Web Applications
    Zhao, Ruilian
    Chen, Chen
    Wang, Weiwei
    Guo, Junxia
    WEB ENGINEERING, ICWE 2020, 2020, 12128 : 207 - 227
  • [28] Secure Partitioning of Cloud Applications, with Cost Look-Ahead
    Bocci, Alessandro
    Forti, Stefano
    Guanciale, Roberto
    Ferrari, Gian-Luigi
    Brogi, Antonio
    FUTURE INTERNET, 2023, 15 (07)
  • [29] Building Decentralized Applications for the Social Web
    Sambra, Andrei
    Guy, Amy
    Capadisli, Sarven
    Greco, Nicola
    PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'16 COMPANION), 2016, : 1033 - 1034
  • [30] Building enterprise web applications with java
    Salo, T.
    Hill, J.
    JOOP - Journal of Object-Oriented Programming, 2000, 13 (02): : 28 - 29