sibly using other formalisms than Alloy, has a great
potential to further enhance or validate the security of
emerging web technologies and specifications.
The full report of the security analysis (De Ryck
et al., 2012) does not only cover potential increases
of the attack surface, but also discusses how specific-
ations suffer from under-specification and ambiguity,
leading to inconsistent and potentially insecure imple-
mentations as a consequence. Additionally, the full
report illustrates that mainstream implementationsnot
always comply with explicit security considerations
stated in the specifications. As a consequence, se-
curely specified features might in practice still be vul-
nerable due to this mismatch.
6 CONCLUSIONS
In this paper, we aimed to thoroughly scrutinize emer-
ging web standards for potential security problems.
We performed a systematic and repeatable analysis
using two generally applicable security goals: preser-
vation of security invariants and graceful interaction
of co-existing features. From the security analysis, we
can conclude that the overall security of the standards
is quite good. Nonetheless did we identify several vi-
olations of one of the stated security goals under cer-
tain application-specific circumstances.
ACKNOWLEDGEMENTS
The results presented in this paper build on experience
from an earlier security analysis performed with the
support of ENISA (De Ryck et al., 2011c). This re-
search is partially funded by IBBT, IWT, the Research
Fund K.U. Leuven and the EU-funded FP7-projects
WebSand and NESSoS.
REFERENCES
Aggarwal, G., Bursztein, E., Jackson, C., and Boneh, D.
(2010). An analysis of private browsing modes in
modern browsers. In Proc. of 19th Usenix Security
Symposium.
Akhawe, D., Barth, A., Lam, P. E., Mitchell, J., and Song,
D. (2010). Towards a formal foundation of web se-
curity. Computer Security Foundations Symposium,
IEEE, 0:290–304.
Barth, A., Jackson, C., and Mitchell, J. C. (2008). Securing
frame communication in browsers. In In Proceedings
of the 17th USENIX Security Symposium (USENIX Se-
curity 2008).
De Ryck, P., Decat, M., Desmet, L., Piessens, F., and
Joosen, W. (2011a). Security of web mashups: a sur-
vey. In 15th Nordic Conference in Secure IT Systems
(NordSec 2010).
De Ryck, P., Desmet, L., Joosen, W., and Piessens, F.
(2011b). Automatic and precise client-side protection
against csrf attacks. Computer Security–ESORICS
2011, pages 100–116.
De Ryck, P., Desmet, L., Philippaerts, P., and Piessens, F.
(2011c). A security analysis of next generation web
standards. Technical report, European Network and
Information Security Agency (ENISA).
De Ryck, P., Desmet, L., Piessens, F., and Joosen, W.
(2012). A security analysis of emerging web standards
- extended version. Technical Report CW 622, De-
partment of Computer Science, K.U.Leuven, Leuven,
Belgium.
Doty, N., Mulligan, D. K., and Wilde, E. (2010). Privacy
issues of the w3c geolocation api.
Heiderich, M. (2011). Html5 security cheatsheet. http://
code.google.com/p/html5security/.
Law, E. (2010). Combating clickjacking with x-frame-
options. http://blogs.msdn.com/b/ieinternals/archive/
2010/03/30/ combating- clickjacking- with- x- frame-
options.aspx.
Magazinius, J., Phung, P., and Sands, D. (2010). Safe wrap-
pers and sane policies for self protecting javascript. In
15th Nordic Conference on Secure IT Systems.
Meyerovich, L. and Livshits, B. (2010). Conscript: Spe-
cifying and enforcing fine-grained security policies
for javascript in the browser. In Security and Privacy
(SP), 2010 IEEE Symposium on, pages 481–496.
Miller, M.S., Samuel, M., Laurie, B., Awad, I., and Stay, M.
(2008). Caja: Safe active content in sanitized javas-
cript. http://google-caja. googlecode. com/files/caja-
spec-2008-01-15.pdf.
Phung, P. H., Sands, D., and Chudnov, A. (2009). Light-
weight self-protecting javascript. In Proc. of the 4th
International Symposium on Information, Computer,
and Communications Security, pages 47–60.
Rydstedt, G., Bursztein, E., Boneh, D., and Jackson, C.
(2010). Busting frame busting: a study of clickjacking
vulnerabilities at popular sites. In in IEEE Oakland
Web 2.0 Security and Privacy (W2SP 2010).
Sterne, B. and Barth, A. (2011). Content security policy.
http://www.w3.org/TR/CSP/.
Su, Z. and Wassermann, G. (2006). The essence of com-
mand injection attacks in web applications. In ACM
SIGPLAN Notices, volume 41, pages 372–382. ACM.
Ter Louw, M., Ganesh, K. T., and Venkatakrishnan, V. N.
(2010). Adjail: Practical enforcement of confidenti-
ality and integrity policies on web advertisements. In
19th USENIX Security Symposium.
Van Acker, S., De Ryck, P., Desmet, L., Piessens, F., and
Joosen, W. (2011). Webjail: Least-privilege integra-
tion of third-party components in web mashups. In
Proceedings of the 27th Annual Computer Security
Applications Conference, pages 307–316. ACM.
Zalewski, M. (2011). Postcards from the post-xss world.
http://lcamtuf.coredump.cx/postxss/.
Zeller, W. and Felten, E. W. (2008). Cross-site request for-
geries: Exploitation and prevention. Technical report,
Princeton University.
SECRYPT2012-InternationalConferenceonSecurityandCryptography
262