Towards revealing JavaScript program intents using abstract interpretation

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Everyday, millions of Internet users access AJAX-powered web applications. However, such richness is prone to security issues. In particular, Web 2.0 attacks are difficult to detect and block since it is similar to legitimate traffic. As a ground for our research, we review past related works and explain what might be missing to tackle Web 2.0 security issues. Especially, we show that tackling AJAX-based attacks often lacks a context that can only be conveyed during real-time analysis. In our research, we advocate the usage of abstract interpretation of JavaScript code to provide maximum coverage and to ensure completeness. Besides, we introduce a proxy-based proposal to provide analysis of JavaScript malware.

Original languageEnglish
Title of host publicationAsian Internet Engineering Conference, AINTEC 2010
Pages87-94
Number of pages8
DOIs
Publication statusPublished - 1 Dec 2010
Externally publishedYes
Event6th Asian Internet Engineering Conference, AINTEC 2010 - Bangkok, Thailand
Duration: 15 Nov 201017 Nov 2010

Publication series

NameAsian Internet Engineering Conference, AINTEC 2010

Conference

Conference6th Asian Internet Engineering Conference, AINTEC 2010
Country/TerritoryThailand
CityBangkok
Period15/11/1017/11/10

Keywords

  • JavaScript malware
  • Web 2.0
  • abstract interpretation
  • client-side

Fingerprint

Dive into the research topics of 'Towards revealing JavaScript program intents using abstract interpretation'. Together they form a unique fingerprint.

Cite this