Secure Behavior of Web Browsers to Prevent Information Leakages

Recently Web browsers are widely used as client-side application platforms
beyond the traditional use of Web browsers.
One of main reasons for such evolution of the browsers is a client-side
JavaScript language that can execute programs embedded in a document.
However, Web applications with client-side JavaScript programs have problems
in leaking private information (such as cookie information)
due to interactions between a browser and scripts embedded in a document.
In order to prevent Web browsers from leaking information, we propose
a calculus representing browser behavior with considering information flows.
The proposed calculus can deal with script rewriting and higher-order functions.
In addition, our calculus has a noninterference property depending on a security
policy statically given by a user.

By: Takaaki Tateishi, Naoshi Tabuchi

Published in: RT0736 in 2007

LIMITED DISTRIBUTION NOTICE:

This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.

RT0736.pdf

Questions about this service can be mailed to reports@us.ibm.com .