File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: OMash: Enabling secure web mashups via object abstractions

TitleOMash: Enabling secure web mashups via object abstractions
Authors
KeywordsBrowser
Communication
Mashup
Object abstraction
Protection
Same origin policy
Security model
Web
Issue Date2008
Citation
Proceedings of the ACM Conference on Computer and Communications Security, 2008, p. 99-107 How to Cite?
AbstractThe current security model used by web browsers, the Same Origin Policy (SOP), does not support secure cross-domain communication desired by web mashup developers. The developers have to choose between no trust, where no communication is allowed, and full trust, where third-party content runs with the full privilege of the integrator. Furthermore, the SOP has its own set of security vulnerabilities and pitfalls, including Cross-Site Request Forgery, DNS rebinding and dynamic pharming. To overcome the unfortunate tradeoff between security and functionality forced upon today's mashup developers, we propose OMash, a simple abstraction that treats web pages as objects and allows objects to communicate only via their declared public interfaces. Since OMash does not rely on the SOP for controlling DOM access or cross-domain data exchange, it does not suffer from the SOP's vulnerabilities. We show that OMash satisfies the trust relationships desired by mashup authors and may be configured to be backward compatible with the SOP. We implemented a prototype of OMash using Mozilla Firefox 2.0 and demonstrated several proof-of-concept applications. Copyright 2008 ACM.
Persistent Identifierhttp://hdl.handle.net/10722/346547
ISSN
2023 SCImago Journal Rankings: 1.430

 

DC FieldValueLanguage
dc.contributor.authorCrites, Steven-
dc.contributor.authorHsu, Francis-
dc.contributor.authorChen, Hao-
dc.date.accessioned2024-09-17T04:11:39Z-
dc.date.available2024-09-17T04:11:39Z-
dc.date.issued2008-
dc.identifier.citationProceedings of the ACM Conference on Computer and Communications Security, 2008, p. 99-107-
dc.identifier.issn1543-7221-
dc.identifier.urihttp://hdl.handle.net/10722/346547-
dc.description.abstractThe current security model used by web browsers, the Same Origin Policy (SOP), does not support secure cross-domain communication desired by web mashup developers. The developers have to choose between no trust, where no communication is allowed, and full trust, where third-party content runs with the full privilege of the integrator. Furthermore, the SOP has its own set of security vulnerabilities and pitfalls, including Cross-Site Request Forgery, DNS rebinding and dynamic pharming. To overcome the unfortunate tradeoff between security and functionality forced upon today's mashup developers, we propose OMash, a simple abstraction that treats web pages as objects and allows objects to communicate only via their declared public interfaces. Since OMash does not rely on the SOP for controlling DOM access or cross-domain data exchange, it does not suffer from the SOP's vulnerabilities. We show that OMash satisfies the trust relationships desired by mashup authors and may be configured to be backward compatible with the SOP. We implemented a prototype of OMash using Mozilla Firefox 2.0 and demonstrated several proof-of-concept applications. Copyright 2008 ACM.-
dc.languageeng-
dc.relation.ispartofProceedings of the ACM Conference on Computer and Communications Security-
dc.subjectBrowser-
dc.subjectCommunication-
dc.subjectMashup-
dc.subjectObject abstraction-
dc.subjectProtection-
dc.subjectSame origin policy-
dc.subjectSecurity model-
dc.subjectWeb-
dc.titleOMash: Enabling secure web mashups via object abstractions-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1145/1455770.1455784-
dc.identifier.scopuseid_2-s2.0-70349300102-
dc.identifier.spage99-
dc.identifier.epage107-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats