Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








25 Hits in 6.9 sec

The Multi-Principal OS Construction of the Gazelle Web Browser

Helen J. Wang, Chris Grier, Alexander Moshchuk, Samuel T. King, Piali Choudhury, Herman Venter
2009 USENIX Security Symposium  
In this paper, we introduce Gazelle, a secure web browser constructed as a multi-principal OS.  ...  to manage the protection of all system resources among web site principals.  ...  We also thank the following folks for their help: Barry Bond, Jeremy Condit, Rich Draves, David Driver, Jeremy Elson, Xiaofeng Fan, Manuel Fandrich, Cedric Fournet, Chris Hawblitzel, Jon Howell, Galen  ... 
dblp:conf/uss/WangGMKCV09 fatcat:fxiwz3a7mbfg3brvv73ocae3mi

Ready for a Web OS?

Alex Wright
2009 Communications of the ACM  
The multi-principal OS construction of the Gazelle web browser, Proceedings of the 18th USENIX Security Symposium, Montreal, Canada, August 2009.  ...  The hegemony of the desktop OS is starting to fracture with the emergence of a new generation of browsers that may finally herald the long-awaited convergence of Web and OS.  ...  With the OP browser, researchers at the University of Illinois at Urbana-Champaign explored applying OS principles to Web browser design by breaking the browser program into smaller subsystems.  ... 
doi:10.1145/1610252.1610260 fatcat:3qiugduhrzd3vd5jtrgpycwt4y

ESCUDO: A Fine-Grained Protection Model for Web Browsers

Karthick Jayaraman, Wenliang Du, Balamurugan Rajagopalan, Steve J. Chapin
2010 2010 IEEE 30th International Conference on Distributed Computing Systems  
We describe our implementation of a prototype of ESCUDO in the Lobo web browser, and illustrate how web applications can use ESCUDO for securing their resources.  ...  We argue that this disconnection between the protection needs of modern web applications and the protection models used by web browsers that manage those applications amounts to a failure of access control  ...  New browser architectures: The OP web browser isolates each web page instance and various browser components using OS processes [14] .  ... 
doi:10.1109/icdcs.2010.71 dblp:conf/icdcs/JayaramanDRC10 fatcat:7gaztmgmwjfbbicw665vd4e62u

A Classification Framework for Web Browser Cross-Context Communication [article]

Ivan Zuzak School of Electrical Engineering and Computing, University of Zagreb, Croatia, Google Inc., Zurich, Switzerland)
2011 arXiv   pre-print
Demand for more advanced Web applications is the driving force behind Web browser evolution.  ...  In this paper we present a systematization of cross-context communication systems for Web browsers.  ...  Acknowledgements The authors acknowledge the support of the Ministry of Science, Education, and Sports of the Republic of Croatia through the Computing Environments for Ubiquitous Distributed Systems  ... 
arXiv:1108.4770v1 fatcat:vvknry637raptds6jch2vrut7q

Atlantis

James Mickens, Mohan Dhawan
2011 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles - SOSP '11  
Thus, web applications that desire robustness must use a variety of conditional code paths and ugly hacks to deal with the vagaries of their runtime.  ...  like the current browser runtime.  ...  Thus, in contrast to prior microkernel browsers, Atlantis is more accurately described as an exokernel browser [16] in which web pages supply their own "library OSes" that implement the bulk of the web  ... 
doi:10.1145/2043556.2043577 dblp:conf/sosp/MickensD11 fatcat:b2vc4lzp5fg7depjgsj7a4zeey

Treehouse: Javascript Sandboxes to Help Web Developers Help Themselves

Lon Ingram, Michael Walfish
2012 USENIX Annual Technical Conference  
While the goal of containment is far from new, the requirement of deployability leads us to a new design point, one that applies the OS ideas of sandboxing and virtualization to the JavaScript context.  ...  Our approach, called TreeHouse, sandboxes JavaScript code by repurposing a feature of current browsers (namely Web Workers).  ...  The site includes the code that implements Tree-House, the pages used in our experiments, and demos.  ... 
dblp:conf/usenix/IngramW12 fatcat:i3ciyc3mwfh6pjg5qt4rllymve

Establishing Browser Security Guarantees through Formal Shim Verification

Dongseok Jang, Zachary Tatlock, Sorin Lerner
2012 USENIX Security Symposium  
Web browsers mediate access to valuable private data in domains ranging from health care to banking.  ...  We give a specification of our kernel, show that the implementation satisfies the specification, and finally show that the specification implies several security properties, including tab non-interference  ...  We would also like to thank our shepherd, Anupam Datta, and the anonymous reviewers for helping us improve our paper.  ... 
dblp:conf/uss/JangTL12 fatcat:nohyd6q6mrh7vkpgnlh3i6jq4i

Compartmental memory management in a modern web browser

Gregor Wagner, Andreas Gal, Christian Wimmer, Brendan Eich, Michael Franz
2011 Proceedings of the international symposium on Memory management - ISMM '11  
Since their inception, the usage pattern of web browsers has changed substantially.  ...  Rather than sequentially navigating static web sites, modern web browsers often manage a large number of simultaneous tabs displaying dynamic web content, each of which might be running a substantial amount  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1145/1993478.1993496 dblp:conf/iwmm/WagnerGWEF11 fatcat:oxgndv5o7neppibraxai6fkto4

Verified Security for Browser Extensions

Arjun Guha, Matthew Fredrikson, Benjamin Livshits, Nikhil Swamy
2011 2011 IEEE Symposium on Security and Privacy  
Popup blocking, form filling, and many other features of modern web browsers were first introduced as thirdparty extensions. New extensions continue to enrich browsers in unanticipated ways.  ...  We formalize the semantics of policies in terms of a safety property on the execution of extensions and develop a verification methodology that allows us to statically check extensions for policy compliance  ...  Acknowledgements: We thank Juan Chen, Cédric Fournet, Ben Lerner, Jean Yang, and the anonymous reviewers for both useful feedback and assistance with this work.  ... 
doi:10.1109/sp.2011.36 dblp:conf/sp/GuhaFLS11 fatcat:oi4li2lc4japvn4ammv7b5vrry

A Study of Security Isolation Techniques

Rui Shu, Peipei Wang, Sigmund A Gorski III, Benjamin Andow, Adwait Nadkarni, Luke Deshotels, Jason Gionta, William Enck, Xiaohui Gu
2016 ACM Computing Surveys  
At the top level, we consider two principal aspects: mechanism and policy. Each aspect is broken down into salient dimensions that describe key properties.  ...  Security isolation is a foundation of computing systems that enables resilience to different forms of attacks.  ...  Any opinions, conclusions or recommendations expressed in this article are those of the authors and do not necessarily reflect the views of the funding agencies.  ... 
doi:10.1145/2988545 fatcat:5llqb3ghnjgghh2yye4vqslz4y

Webinos Project Deliverable: Phase 2 Security Framework

Webinos Consortium
2012 Zenodo  
The webinos project defines and delivers an open source web application runtime compatible with a wide range of smart devices, including smartphones, tablets, PCs, in-car systems and set-top boxes.  ...  It provides a set of recommendations and describes the outstanding weaknesses and issues of which webinos stakeholders may need to be aware.  ...  /portal/wac-2.0-spec 8.146.Wang2009 Wang, Helen J. and Grier, Chris and Moshchuk, Alexander and King, Samuel T. and Choudhury, Piali and Venter, Herman The multi-principal OS construction of the  ... 
doi:10.5281/zenodo.1147031 fatcat:x53nqshe7jfqrnbq6urpvsj2ra

Preventing accidental data disclosure in modern operating systems

Adwait Nadkarni, William Enck
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
Modern OSes such as Android, iOS, and Windows 8 have changed the way consumers interact with computing devices.  ...  As users direct this workflow between applications, it is dicult to predict the consequence of each step.  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the funding agencies.  ... 
doi:10.1145/2508859.2516677 dblp:conf/ccs/NadkarniE13 fatcat:pryzgt6nrvbw3bwbahs7a2c6ja

Effects and opportunities of native code extensions for computationally demanding web applications [article]

Dennis Jarosch, Humboldt-Universität Zu Berlin, Humboldt-Universität Zu Berlin
2017
An increasing number of users perform their daily computing tasks entirely within the web browser, turning the Web into an important platform for application development.  ...  The Web as a platform, however, lacks the computational performance of native applications.  ...  Microsoft Research has presented Gazelle, the idea of the web browser as a "multi-principal OS for web site principals", in which the browser kernel manages resource protection exclusively [Wang et al  ... 
doi:10.18452/16451 fatcat:racqnzleubghfkj4doyzueqmqu

Protecting Incorrectly Implemented Web Applications From Online Adversaries

Eric Y. Chen
2018
of web browsers, and 2) securing inter-applicationcommunication protocols via program verifi cation.  ...  They can be caused by a multitude of factors, including weaknesses in browsers' security policies anddevelopers' misinterpretations of web protocols (e.g., OAuth and OpenId).  ...  We can simulate the state benefits of using a separate browser for an app with a single multi-process browser.  ... 
doi:10.1184/r1/7334297.v1 fatcat:a44vujdjozdlvjbagnt4ev6bdy

29th Annual Computational Neuroscience Meeting: CNS*2020

2020 BMC Neuroscience  
Furthermore they must start to evade predators and find food before this construction process is complete.  ...  Deep RL offers a rich framework for studying the interplay among learning, representation and decision-making, offering to the brain sciences a new set of research tools and a wide range of novel hypotheses  ...  Acknowledgements: This research is funded by the National Science Foundation (grants #1822517 and #1921515 to SJ), the National Institute of Mental Health (grant #MH117488 to SJ), the California Nano-Systems  ... 
doi:10.1186/s12868-020-00593-1 pmid:33342424 fatcat:edosycf35zfifm552a2aogis7a
« Previous Showing results 1 — 15 out of 25 results