to a unique namespace. Although specific issues
with ADSafe and FBJS(S. Maffeis and A. Taly,
2009) in the security of JavaScript subset are
discovered, they do not break the fundamental of the
language. More importantly, the security of caja-
based JavaScript subsets has been able to prove to be
capability safe(S. Maffeis et al., 2010).
ConScript enables the specification and
enforcement of fine-grained security policies for
JavaScript in the browser(B. Livshits and L.
Meyerovich, 2009). Self-protecting JavaScript(P. H.
Phung, 2009) provides similar security features, but
does not require specific support within the browser.
Policy enforcement is achieved by wrapping
security-sensitive JavaScript operations before
normal script execution.
AdJail(M. Ter Louw et al. 2010) offers a
technique to mediate access to advertisements, which
are embedded as a DOM object and executed in an
iframe while interacting with hosting page. Our work
is comparable with AdJail in the way of seperating
untrusted content and interacting with hosting page,
but we make use of the more secure “web workers”
element in HTML5 considering the drawback of
frames. They utilize the html parsing and script
execution by native frame window with hooked
DOM manipulating APIs. But we argue that such
process is not capable of controlling every phase of
html parsing and browser behavior, and also too
coarse in the case of applying particular security
rules. Instead, by creating a fully implemented fake
DOM environment in the secure web workers, we
have everything at our hand. Thus, any attacks
targeting at frame or navigation will be nullified
while may easily compromise their technique.
6 CONCLUSIONS
In this paper, we present FSMesh as a solution for
the problem of confinement of third-party mashups
to prevents attacks on confidentiality and integrity.
The new safe framework which is based on HTML5
technology creates a separated fake DOM
environment in the background which allows
developers to load untrusted content into the
“sandbox” and apply their custom security policy in
real window. The benefit of FSMesh is both in
flexibility security policy enforcement and minimum
modification of original content. Our approach offers
developers an easy solution for confining untrusted
content in main stream browsers without steep
learning curve or installing new software. Although
the current framework suffers big overhead
performance problem, we believe that it can be
overcome by optimization. We plan to make the idea
possible by first inspecting the source code of web
workers for browsers and make extension for it to
support the function of FSMesh.
REFERENCES
I. Hickson and D. Hyatt (2011). Html 5 working draft
cross document messaging. http://www.w3.org/TR/
html5/comms.html#crossDocumentMessages.
I. Hickson and D. Hyatt (2011). Html 5 working draft - the
sandbox attribute. http://www.w3.org/TR/html5/the-
iframe-element.html#attr-iframe-sandbox.
H. J. Wang, X. Fan, J. Howell, and C. Jackson (2007).
Protection and communication abstractions for web
browsers in mashupos. ACM SIGOPS Operating
Systems Review, 41(6):16.
S. Crites, F. Hsu, and H. Chen (2008). Omash: Enabling
secure web mashups via object abstractions. In
Proceedings of the 15th ACM conference on
Computer and communications security, pages 99-
108. ACM.
D. Crockford (2011). Adsafe. http://www.adsafe.org/.
Facebook (2011). FBJS. http://developers.facebook.com/
docs/fbjs/.
M. S. Miller, M. Samuel, B. Laurie, I. Awad, and M. Stay
(2008). Caja: Safe active content in sanitized
javascript. http://google-caja.googlecode.com/files/
caja-spec-2008-06-07.pdf.
S. Maffeis and A. Taly (2009). Language-based isolation
of untrusted javascript. In 22nd IEEE Computer
Security Foundations Symposium, pages 77-91.
S. Maffeis, J. C. Mitchell, and A. Taly (2010). Object
capabilities and isolation of untrusted web
applications. In Proceedings of IEEE Security and
Privacy'10. IEEE.
B. Livshits and L. Meyerovich (2009). Conscript:
Specifying and enforcing fine-grained security policies
for javascript in the browser. Technical report,
Microsoft Research.
P. H. Phung, D. Sands, and A. Chudnov (2009).
Lightweight self-protecting javascript. In Proceedings
of the 4th International Symposium on Information,
Computer, and Communications Security, pages 47-
60.
M. Ter Louw, K. T. Ganesh, and V. N. Venkatakrishnan
(2010). Adjail: Practical enforcement of confidentiality
and integrity policies on web advertisements. In 19th
USENIX Security Symposium.
John Resig (2011). Envjs – Bring the browser to the
server. http://www.envjs.com/.
Mike Ter Louw and V. N. Venkatakrishnan (2009).
Blueprint: Robust prevention of cross-site scripting
attacks for existing browsers. In IEEE Symposium on
Security and Privacy, Oakland, CA, USA.
Ian Hickson (2011). Web Workers.http://dev.w3.org/
html5/workers/. July 2011
WEBIST2012-8thInternationalConferenceonWebInformationSystemsandTechnologies
102