Securing the Web Platform Securing the Web Platform
Collin Jackson
Stanford University
Securing the Web Platform Securing the Web Platform Collin Jackson - - PowerPoint PPT Presentation
Securing the Web Platform Securing the Web Platform Collin Jackson Stanford University The Web Platform The Web Platform Dynamic Ubiquitous Dynamic Ubiquitous Interactive Instant updates Interactive Instant updates Pages Web Applications
Stanford University
Pages Pages Web Applications Web Applications Programs Programs Dynamic Dynamic Interactive Interactive Ubiquitous Ubiquitous Instant updates Instant updates
Collin Jackson, Dan Simon, Collin Jackson, Dan Simon, Desney Desney Tan, and Adam Barth. Tan, and Adam Barth. An Evaluation of Extended Validation and Picture An Evaluation of Extended Validation and Picture‐ ‐in in‐ ‐ Picture Phishing Attacks (USEC 2007) Picture Phishing Attacks (USEC 2007) Blake Ross, Collin Jackson, Nick Miyake, Dan Blake Ross, Collin Jackson, Nick Miyake, Dan Boneh Boneh, and , and John C. Mitchell. Stronger Password Authentication Using John C. Mitchell. Stronger Password Authentication Using Browser Extensions (USENIX Security 2005) Browser Extensions (USENIX Security 2005)
Adam Barth, Collin Jackson, and John C. Mitchell. Securing Adam Barth, Collin Jackson, and John C. Mitchell. Securing Browser Frame Communication. (USENIX Security 2008) Browser Frame Communication. (USENIX Security 2008) Helen J. Wang, Helen J. Wang, Xiaofeng Xiaofeng Fan, Jon Howell, and Collin Fan, Jon Howell, and Collin
Web Browsers in Web Browsers in MashupOS
. (SOSP 2007) Collin Jackson and Helen J. Wang. Subspace: Secure Cross Collin Jackson and Helen J. Wang. Subspace: Secure Cross‐ ‐ Domain Communication for Web Domain Communication for Web Mashups Mashups (WWW 2007) (WWW 2007) Adam Barth, Collin Jackson, and John C. Mitchell. Robust Adam Barth, Collin Jackson, and John C. Mitchell. Robust Defenses for Cross Defenses for Cross‐ ‐Site Request Forgery (CCS 2008) Site Request Forgery (CCS 2008) Collin Jackson, Andrew Collin Jackson, Andrew Bortz Bortz, Dan , Dan Boneh Boneh, and John C. Mitchell. , and John C. Mitchell. Protecting Browser State from Web Privacy Attacks (WWW Protecting Browser State from Web Privacy Attacks (WWW 2006) 2006) Collin Jackson, Adam Barth, Andrew Collin Jackson, Adam Barth, Andrew Bortz Bortz, , Weidong Weidong Shao Shao, , and Dan and Dan Boneh
. Protecting Browsers from DNS Rebinding Attacks (CCS 2007) Attacks (CCS 2007)
awglogin awglogin
window.open("https://attacker.com/", "awglogin"); window.open("https://attacker.com window.open("https://attacker.com/", " /", "awglogin awglogin"); ");
Collin Jackson and Adam Barth. Collin Jackson and Adam Barth. Beware of Finer Beware of Finer‐ ‐Grained Origins (W2SP 2008) Grained Origins (W2SP 2008) Collin Jackson and Adam Barth. Collin Jackson and Adam Barth. ForceHTTPS ForceHTTPS Cookies: A Cookies: A Defense Against Eavesdropping and Defense Against Eavesdropping and Pharming Pharming (WWW 2008) (WWW 2008) Adam Barth, Collin Jackson, Charles Reis, and the Google Adam Barth, Collin Jackson, Charles Reis, and the Google Chrome Team. The Security Architecture of the Chromium Chrome Team. The Security Architecture of the Chromium Browser (Tech Report) Browser (Tech Report) Collin Jackson, Dan Collin Jackson, Dan Boneh Boneh, and John C. Mitchell. Transaction , and John C. Mitchell. Transaction Generators: Generators: Rootkits Rootkits for the Web ( for the Web (HotSec HotSec 2007) 2007)