Detecting Malicious JavaScript Code in Mozilla
- 27 July 2005
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
The JavaScript language is used to enhance the client-side display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Browsers provide sand-boxing mechanisms to prevent JavaScript code from compromising the security of the client's environment, but, unfortunately, a number of attacks exist that can be used to steal users' credentials (e.g., cross-site scripting attacks) and lure users into providing sensitive information to unauthorized parties (e.g., phishing attacks). We propose an approach to solve this problem that is based on monitoring JavaScript code execution and comparing the execution to high-level policies, to detect malicious code behavior. To achieve this goal it is necessary to provide a mechanism to audit the execution of JavaScript code. This is a difficult task, because of the close integration of JavaScript with complex browser applications, such as Mozilla. This paper presents the first existing implementation of an auditing system for JavaScript interpreters and discusses the pitfalls and lessons learned in developing the auditing mechanism.Keywords
This publication has 4 references indexed in Scilit:
- Intrusion detection: a brief history and overviewComputer, 2002
- The Safe-Tcl Security ModelPublished by Springer Nature ,1998
- Secure Web scriptingIEEE Internet Computing, 1998
- Efficient software-based fault isolationACM SIGOPS Operating Systems Review, 1993