The subject invention relates generally to Web browsers, and more particularly to techniques and mechanisms for enhanced security and communication implementable by Web browsers for supporting Web applications.
Web browsers are increasingly becoming a single-stop resource for computing needs including information access, personal communications, office tasks, and e-commerce. Conventional Web applications synthesize the world of data and code, offering rich services through Web browsers and rivaling those of desktop PCs. Web browsers have evolved from a single-principal platform on which users browse one site at a time into a multi-principal platform on which data and code from mutually distrusting sites interact programmatically in a single page on the client side, enabling feature-rich “Web 2.0” applications (or “mashups”) that offer close-to-desktop experiences. These applications also resemble the PC operating environment, where mutually distrusting users share host resources.
However, unlike PCs, which utilize multi-user operating systems for resource sharing, protection, and management, conventional browsers provide a limited binary trust model and protection mechanisms suitable only for a single-principal system. In particular, conventional browsers can typically only offer either no trust across principals through complete isolation or full trust through incorporating third party code as libraries. Consequently, Web programmers are forced to make tradeoffs between security and functionality, and often times must sacrifice security for functionality.
Accordingly, there exists a need in the art for protection and communication mechanisms that can enhance the security of a browser without an undue sacrifice in functionality.
The following presents a simplified summary of the invention in order to provide a basic understanding of some aspects of the invention. This summary is not an extensive overview of the invention. It is intended to neither identify key or critical elements of the invention nor delineate the scope of the invention. Its sole purpose is to present some concepts of the invention in a simplified form as a prelude to the more detailed description that is presented later.
Systems and methodologies in accordance with various embodiments disclosed herein can mitigate the above-noted deficiencies to enable robust and secure Web applications on a rich multi-principal platform. By drawing an analogy between the sharing of browser resources by Web sites and the sharing of operating system resources by users, protection and communication abstractions for Web browsers can be developed in accordance with various aspects described herein. The goal of protection is to prevent one principal from compromising the confidentiality and integrity of other principals, while communication allows them to interact in a controlled manner. In accordance with one aspect, these abstractions can be designed to match all of the common trust levels between Web service providers and integrators, to strike a balance between ease of use for programming and security, and to allow easy adoption by including fallback mechanisms and avoiding unintended behavior in legacy browsers.
In accordance with one aspect, restricted services can be employed by content providers as a fundamental addition to conventional Web service provisioning. For example, a content provider may identify a service as restricted if the provider does not trust the service to access other private content from the provider's domain. An example of a restricted service may be user profiles on a social networking site. A content provider may also host restricted services differently from public services such that no client browser will regard the services as publicly available. This may be done, for example, by specifying the restricted nature of the service using the MIME protocol with a MIME content subtype data for the service.
In accordance with another aspect, a browser abstraction may facilitate an asymmetric level of trust between a content provider and a content integrator when restricted content or untrusted public library content is to be utilized by the integrator. This abstraction may be implemented, for example, through a <Sandbox> HTML tag and corresponding resource containment functionality implemented for a client Web browser. In one example, the <Sandbox> HTML tag and corresponding browser abstraction and functionality may be utilized to enclose untrusted user input for a web service, thereby facilitating the prevention of cross-site scripting (XSS) attacks on a Web-based application.
In accordance with yet another aspect, a browser abstraction may facilitate resource management and isolation for access-controlled content. This abstraction may be implemented, for example, through a <ServiceInstance> HTML tag and corresponding resource control functionality implemented for a client Web browser. In one example, resources managed and/or isolated using the <ServiceInstance> HTML tag and corresponding browser abstraction may communicate with one another in a controlled manner using an additional browser abstraction and a corresponding CommRequest object. In another example, access-controlled content may be flexibly displayed at a client Web browser using another additional browser abstraction and a corresponding <Friv> HTML tag
In accordance with still another aspect, a client Web browser may be extended by employing a script engine proxy in connection with the Web browser. The script engine proxy can interpose between the rendering engine of the browser and the script engine of the browser for customization for Document Object Model (DOM) object manipulation.
To the accomplishment of the foregoing and related ends, the invention then, comprises the features hereinafter fully described and particularly pointed out in the claims. The following description and the annexed drawings set forth in detail certain illustrative aspects of the invention. These aspects are indicative, however, of but a few of the various ways in which the principles of the invention may be employed and the subject invention is intended to include all such aspects and their equivalents. Other objects, advantages and novel features of the invention will become apparent from the following detailed description of the invention when considered in conjunction with the drawings.
The present invention is now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It may be evident, however, that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing the present invention.
As used in this application, the terms “component,” “system,” “algorithm,” and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a server and the server can be a component. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between two or more computers. The components may communicate via local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the Internet with other systems via the signal).
Thus, the embodiments disclosed herein, or certain aspects or portions thereof, may take the form of program code (i.e., instructions) embodied in tangible media, such as floppy diskettes, CD-ROMs, hard drives, or any other machine-readable storage medium. When the program code is loaded into and executed by a machine, such as a computer, the machine becomes an apparatus for practicing the invention. In the case of program code execution on programmable computers, the computing device generally includes a processor, a storage medium readable by the processor (including volatile and non-volatile memory and/or storage elements), at least one input device, and at least one output device.
Referring now to the drawings,
In general, the Web has evolved from a collection of static documents connected by hyperlinks, Dynamic HTML, scripts such as JavaScript, etc., into a dynamic, rich, interactive experience driven by client-side code executed by browsers 30 and aggregation by Web services provided by content integrators 20. However, security policies of conventional browsers are still designed primarily for the older style of Web browsing on static, single-principal sites, as opposed to the newly-evolved style of client mashups, where distrusting sites can interact programmatically on a single Web page.
Same-Origin Policy
As Web pages have become more dynamic, browsers have introduced cookies as a way to differentiate users and to operate in a way that depends on the user. Cookies add state to the otherwise stateless HTTP protocol, giving the user the illusion of isolated, continuous connections to remote sites. Cookies are small, arbitrary pieces of data chosen by the Web server and sent to the browser when responding to a request. They are returned to the server that sent them by the browser on subsequent requests. Web applications built around cookies rely on the browser to keep their sessions isolated from other sites; if an attacker can make requests with the cookie of a logged-in victim, the attacker becomes indistinguishable from the victim. This security policy, enforced by the browser, is known as the Same-Origin Policy (SOP). Under the SOP, only the site that sends some information to the browser may later read or modify that information.
JavaScript, a more recent browser feature, allows code from one page or frame to read and modify other pages or frames using the Document Object Model (DOM), an interface that allows script to read and modify the content, structure, and style of HTML documents. These types of accesses across domain boundaries could allow an attacker to misuse a cookie from a user or even read pages behind corporate firewalls that would not be directly accessible by the author of a script. To prevent these attacks and maintain isolation, the SOP was applied to JavaScript, using a definition of “site” based on the scheme (i.e., http or https), DNS name, and TCP port of the URL. For example, frames from a first Web site and a second Web site are isolated from each other and cannot access resources of the other. The XMLHttpRequest method of data communication, which allows JavaScript to download XML files from its origin server and has become the ubiquitous tool of asynchronous JavaScript and XML (“AJAX”) applications, is constrained by the SOP as well. For example, a frame from a first Web site cannot issue an XMLHttpRequest to a second Web site.
Binary Trust Model
Web developers often wish to incorporate code from third-party sources. JavaScript files rarely contain sensitive information behind firewalls and are usually not access-controlled by cookies, so browsers implicitly assume that files in this format are public code libraries and allow them to be executed across domains, bypassing the SOP. The code runs as a library, with the privileges of the page including it. For example, the page http://a.com/service.html may contain the markup <script src=‘http://b.com/lib.js’>, which allows lib.js to access HTML DOM objects, cookies and data from a.com through XMLHttpRequest. However, lib.js cannot access resources from b.com since lib.js is associated with a.com but not b.com in this context. This powerful but dangerous workaround to the ordinary isolation policy of the SOP manifests a binary trust model: a site either completely distrusts another site and is segregated through the use of cross-domain frames, or a site can use another site's code as its own, offering full resource access to the remote site.
Web Mashups
Web mashups are defined as Web sites that compose data from more than one site. However, this definition is in tension with the same-origin policy, which prevents such communication. Many data providers want to publish information for any integrator site 20 to use, but the same-origin policy prevents an XMLHttpRequest made by a browser 30 from loading the data directly. Initially, mashup developers worked around these restrictions using a proxy approach, by taking information from a third party and making it appear to the browser 30 to be “same-origin.” However, a drawback of this approach is that the content makes several unnecessary round trips, reducing performance. Further, the proxy can become a choke point, limiting scalability. Alternatively, by encoding public data in executable JavaScript format (e.g., JavaScript Object Notation or “JSON”), cross-domain script tags can also be used to pass data from a provider 10 to an integrator 20 across domain boundaries, eliminating the need for proxies. However, this technique has the unfortunate side effect of granting the privileges of the integrator 20 to a provider 10. As a result, the binary trust model of the SOP forces the integrator 20 to make tradeoffs between security and functionality.
Gadget Aggregators
Web gadget aggregators are an advanced form of mashup, combining user-selected active content from third-party sources into a single portal page. A gadget is an HTML-plus-JavaScript component designed to be included into a gadget aggregator page; it is the client side of some Web service. Gadget aggregators are security-conscious; they host each untrusted gadget in a frame on a distinct (sub)domain, relying on the SOP to isolate third-party gadgets from one another and from the outer page. However, because the SOP prevents interoperation among gadgets, aggregators also support inline gadgets, which include third-party code as a library of the aggregator page using the script tag. The binary trust model of conventional browsers 30 unfortunately forces the gadget aggregator to decide between interoperation and isolation. Because inlining requires complete trust, some aggregators ultimately pass the security problem to a user by asking the user whether he trusts the author of an inline module.
Next-Generation Communication Proposals
Frustrated by the limitations of the SOP, mashup developers have expressed a need for a new security policy for the Web, allowing fine-grained policy decision making between communicating domains. Web service providers desire the ability to make their own access control decisions as to whether data they send between domains is public, whether it should be executed, or whether it should be ignored, rather than relying on a browser to make this decision. Several new browser communication proposals have emerged, governed not by the SOP, but rather by a new type of policy called the verifiable-origin policy (VOP). Under the VOP, a site may request information from any other site, and the responder can check the origin of the request to decide how to respond.
Referring now to
Principals and Resources
In accordance with one aspect, Web applications can be viewed in the context of the conventional notion of the multi-user operating system (“OS”), in which different principals have access to different sets of resources. In the OS environment, the principal is a user or group. By associating a process with a principal, the OS ensures that the process only has as much power as the principal that controls the process' behavior. In general, one user does not trust another with respect to the confidentiality and integrity of her resources. In the Web environment, the principal is the owner of some Web content. In practice, browser adherence to the SOP means that the real notion of Web principal is tied to ownership of a DNS domain.
Traditionally, the original cookie specification allowed a page to restrict a cookie to only be sent to its server on subsequent requests if those requests were for pages starting with a particular path prefix. This access control policy does not match the trust hierarchy of most Web server deployments, since the owner of the root of a Web server ultimately controls all the subpaths, while the subpaths may contain less trustworthy, third-party content. With the advent of the SOP, the use of path-restricted cookies became a moot way to protect one page from another on the same server, since same-domain pages can directly access the other pages and pry their cookies loose.
Alternatively, applications may be allowed to identify themselves using more of the URL than the SOP domain tuple; unlike the original cookie path hierarchy, this approach reflects the fact that the root of a Web server dominates its subpaths. The motivation for this alternative is the common Web practice of delegating ownership of Web server content by pathname, such as the ubiquitous /{tilde over ( )}user/ user home directory scheme used on departmental Web servers. Unfortunately, this scheme fails for the same practical reason as cookie paths: providing legacy support for the SOP's coarser notion of principal destroys the distinction between path-based fine-grained principals. The practical consequence of the ubiquity of SOP-domain-based principals is that Web servers that wish to provide fine-grained separation of principals must do so using DNS subdomains rather than subpaths.
Because of the difficulty with escaping the SOP legacy, various aspects described herein preserve the idea of using the SOP domain (<scheme, DNS host, TCP port> tuple) as the principal. Thus, the terms “domain” and “principal” are used interchangeably herein.
Browsers may also provide to applications various resources. For example, browsers may provide memory to an application, which may correspond to the heap of script objects including HTML DOM objects that control the display. This is analogous to process heap memory. In addition, browsers may also provide applications with the ability to store cookies or some other persistent state, which persist across application invocations. This resource is weakly analogous to the OS file system. Further, browsers may provide the ability to send and receive messages outside the application, equivalent to an OS network facility.
Trust Model Among Principals
In accordance with one aspect, the resource management component 220 implements abstractions that match common trust levels of Web programmers in their service creation, whether as a service provider providing a Web service or component or as a service integrator integrating or composing others' services into a mashup. In contrast, conventional browsers offer abstractions for only a binary trust model, which is insufficient for today's Web services.
Services Offered by Providers
Service providers have expressed a need to segregate the data and code that they serve into three categories. The first such category is private, sensitive content, which must be access-controlled by the service provider through a well-defined service API. For example, for a Web mail provider, a user's mailbox and contact list are sensitive information; access to that information must be authenticated and authorized through a service API given by the Web mail provider. Services that control access to the private, sensitive data and code of a provider are herein referred to as access-controlled services. The second category is public content, which can be freely used by anyone. For example, a map provider may give away a code library for anyone to use for accessing its public map data. Such services are herein referred to as library services.
The third of said categories is restricted content 210. In accordance with one aspect, restricted content 210 may be third-party content hosted by a provider 10 that is not trusted to access other private content from the domain of the provider 10. Conventionally, there has been no distinction between restricted content 210 and public content from the same domain. For example, a user profile hosted by a social networking Web site in the same domain is conventionally treated as public content. There is no way for the provider to indicate the untrustworthiness of such content and that browsers should deny such content's access to any domain's resources unless explicitly allowed. This deficiency has led to vulnerable Web services that suffer from devastating attacks like Cross Site Scripting (XSS) attacks. In one example, when restricted content 210 is hosted privately and access-controlled by a provider 10, it becomes an access-controlled service as noted above.
For the security of its site, a provider 10 must ensure that no matter how library services and restricted services may be used (or abused) by an integrator 20, it will not violate the access control of the provider's access-controlled services. For example, a provider 10 that offers both an access-controlled mail service and a public map library service must ensure that its map library code or any other third party restricted content 210 has no access to any of its users' mailbox and contact lists.
Restricted Services and Their Usage
In accordance with one aspect, service providers 10 are enabled to offer restricted content 210 and restricted services that host third-party services or components and to enforce the restricted use of them. Allowing differentiation between restricted content 210 and public content has significant security benefits.
Restrictions for Restricted Services
In one example, restricted services can contain any HTML or media content. However, they may not be allowed to have direct access to any principals' resources including their HTML DOM objects, cookies, nor to any principals' remote data store at their backend Web server through XMLHttpRequest. It should be appreciated that this is a one-way restriction that constrains restricted services from their integrators. The other direction of the restriction is at the discretion of integrators. Further, restricted services are allowed to communicate using controlled communication abstractions for both cross-domain browser-to-server communication and cross-domain browser-side communication. The origins of restricted services in such communications are marked as restricted, and the protocol requires participating Web servers to authorize the requester before providing service. Because the requester is anonymous, no participating server will provide any service that it would not otherwise provide publicly.
Hosting Restricted Services
In one example, a content provider 10 or service provider is required to host restricted content 210, say “restricted.r”, differently from other public HTML content so that no browsers 30 will render “restricted.r” as a public HTML page. Otherwise, “restricted.r” could be maliciously loaded into a browser window or frame (e.g., a frame named “uframe”) without the constraints that are intended for restricted services. The supposedly restricted service in “uframe” would have the same principal as the provider's web site and access the provider's resources. This violates the semantics of restricted services and can be exploited by attackers for phishing. To prevent this, the MIME protocol may be employed. In one example, providers 10 of restricted services and/or restricted content 210 are required to indicate their MIME content subtype to be prefixed with x-restricted+. For example, text/html content may be required to be labeled text/x-restricted+html.
Trust Relationship Between Providers and Integrators
The trust relationship between an integrator 20 and a provider 10 at separate domains is summarized in Table I as follows:
The integrator 20 may either trust the provider 10 to fully access the resources of the integrator 20, or not trust the provider 10 and export an access control service API for the provider 10 to access the resources of the integrator 20. This corresponds to the two rows in Table I labeled “Full access” and “Controlled access.” It should be appreciated that Table 1 does not show how the integrator 20 may control its own access to the provider 10, as in this scenario the integrator 20 would serve as its own provider proxying the provider's services.
When the provider 10 offers a library service, if the integrator 20 allows “full access,” then the integrator 20 uses the library as its own code accessing the integrator's resources, such as its HTML DOM objects, cookies, and obtaining remote data from the integrator's Web server through XMLHttpRequest. This manifests a full trust between the integrator 20 and the library service of the provider 10, as shown in Cell 1 in Table 1. If the integrator 20 offers “controlled access,” then this manifests an asymmetric trust, as illustrated in Cell 2, where the integrator 20 can access the library freely, but the library must use the integrator's access control service API to access the integrator's resources. When the provider 10 offers an access-controlled service, if the integrator 20 offers “full access,” then the provider's access control API dictates the resource access on both the provider 10 and the integrator 20. This manifests a controlled trust where the provider 10 trusts the integrator 20 to the extent allowed by the provider's access control policy for the integrator 20. This corresponds to Cell 3 in Table 1. If the integrator 20 instead offers “controlled access,” the exchange of information between the integrator 20 and the provider 10 goes through two access control service APIs. This manifests bi-directional controlled trust, as shown in Cell 4. If an abstraction is provided for the scenario of a single-direction controlled trust, then the bi-directional scenario simply requires two uses of the abstraction, one for each direction. When the provider 10 offers a restricted service and/or restricted content 210, browsers 30 should force the integrator 20 to have at least asymmetric trust with the service regardless of how trusting the consumers are, as shown in Cells 5 and 6.
Conventional browsers only have abstractions for two trust levels: no trust through the use of a cross-domain frame and full trust through script inclusion (Section II). It should be appreciated that no trust is just one configuration of controlled trust. In contrast, the resource management component 220 at client browser 30 provides abstractions for all trust levels described in Table 1. In addition, the abstractions provided by the resource management component 220 may be backward compatible, allowing Web programmers to supply alternative content for browsers that do not support the abstractions provided by the resource management component 220. As a result, web programmers can adopt the provided abstractions with ease and comfort.
Turning now to
Problems with Conventional Browsers
Conventional mainstream browsers have no mechanism for controlled cross-domain communication. The only cross-domain communication primitive available is the <script> tag, which gives a service provider (e.g., a content provider 10) uncontrolled access to the domain of the integrator 20. Techniques for cross-domain communication have been proposed, but they are not widely adopted. Further, each implementation of such proposals exists in isolation, so none provides a general solution to the problem of mismatched trust patterns. As a result of the lack of controlled cross-domain communication, there is also no way for a parent window and a child window, containing mutually untrusted content, to flexibly negotiate the layout of the boundary between them. Browser <frame>s offer isolation at the cost of rigid, parent-controlled layout, and <div>s offer flexible, content-sensitive layout at the cost of requiring full trust between parent and child content. Finally, the only protection abstraction in conventional browsers is the SOP boundary. Unlike an OS process, a single principal cannot instantiate this abstraction multiple times to provide fault containment among multiple applications.
Isolation and Fault Containment: ServiceInstance
To solve these problems, the access control component 332 at client browser 30 can utilize the ServiceInstance abstraction, which enables an application or component from one domain to integrate a component from another domain, isolating the components while enabling controlled communication between them. This abstraction realizes the controlled trust scenario as noted above in Table 1. An application may instantiate a service instance 322 with the following tag:
The tag creates an isolated environment, analogous to an OS process, fetches into it the content from the specified src, and associates it with the domain alice.com that served that content.
In accordance with one aspect, a service instance 322 may protect memory, persistent state, and display resources as follows. To protect memory, each service instance 322 may have its own isolated region of memory. Thus, no service instance 322 can follow a JavaScript object reference to an object inside another service instance 322. This is true even for service instances 322 associated with the same domain, just as multiple OS processes can belong to the same user. Thus, one domain can use service instances 322 to provide fault containment among multiple application instances. To protect persistent state, cookies may be handled no differently in client browser 30 than in conventional browsers—two service instances 322 can access the same cookie data if and only if they belong to the same domain, just as two processes can access the same files if they are running as the same user. To protect display, a raw service instance 322 may come with no display resource. Instead, a parent service instance 322 may be required to allocate a subregion of its own display, which may be referred to as a Friv, and assign the Friv to the child service instance 322. The parent may use Friv to assign multiple regions of its display to the same child service instance 322, just as a single process can control multiple windows in a desktop GUI framework, such as a document window, a palette, and a menu pop-up window.
Flexible Cross-Domain Display: Friv
In accordance with one aspect, a Friv is a flexible cross-domain display abstraction for service instances 322. A Friv behaves like a conventional iframe in that it enables content to use part of its container's display while otherwise isolating their resources. However, the iframe is difficult to use in tightly-integrated applications because the parent specifies the iframe's size regardless of the contents of the iframe. Web developers instead prefer the div tag—because its contents and its container share a domain, the browser layout engine can resize the div's display region to accommodate its contents. In one example, the following tag syntax may create a new Friv and assign it to an existing service instance 322:
<Friv width=400 height=150 instance=“aliceApp”>
Alternatively, this syntax may create a new service instance 322 and a new Friv simultaneously and assign the latter to the former:
The Friv is so named because it crosses the iframe and the div. It isolates the content within, but it includes default handlers that negotiate layout size across the isolation boundary using local communication primitives. These handlers give the Friv convenient div-like layout behavior.
Service instance and Friv life cycle—The life cycle of a service instance 322 is limited, by default, by the service instance's responsibility for some part of the display of the browser 30. A service instance 322 can track the display regions that it owns by registering a pair of handlers with the following methods:
The first callback can be invoked whenever the parent assigns a new Friv display to the service instance 322. When the parent reclaims the display associated with a Friv (e.g., by removing the Friv element from its DOM tree), the Friv's DOM disappears from the child service instance's object space, and the child's onFrivDetached handler is called. The default onFrivAttached and onFrivDetached handlers track the set of Frivs. When the last Friv disappears, the service instance 322 no longer has a presence on the display, so the default handler invokes
ServiceInstance.exit( )
to destroy the service instance 322.
A service instance 322 can act as a daemon by overriding the default handlers so that it continues to run even when it has no Frivs. Such a service instance 322 may continue to communicate with remote servers and local client-side components, and has access to its persistent state.
When a Friv is assigned to a new location (for example, using document.location=url, or equivalently, when the user clicks on a simple link in the Friv's DOM), the Friv's fate depends on the domain of the new location. At least two possibilities for the Friv's fate exist. First, if the domain is different from that of the service instance 322 that presently owns the Friv, the behavior is just as if the parent had deleted the Friv (e.g., by detaching it from the existing service instance 322) and created a new Friv and service instance 322 with the <Friv src= . . . > tag. The only resource carried from the old domain to the new is the allocation of display real-estate assigned to the Friv. This behavior is analogous to creating a new process with a new identity, giving it the handle of the existing X Window region, and disconnecting the prior process from the same X Window. Second, if the domain matches that of the service instance 322 that owns the Friv, then the HTML content at the new location simply replaces the Friv's layout DOM tree, which remains attached to the existing service instance 322. Any scripts associated with the new content are executed in the context of the existing service instance 322.
Browsers 30 may also allow a Web application to create a new “popup” window. The creation of a popup may create a new parentless Friv associated with the service instance 322 that created the popup.
In accordance with one aspect, the legacy <Frame> tag may be implemented with service instances 322 and Frivs as follows. For each domain, there may be a special “legacy” service instance 322, where the <Frame src=x> tag is an alias for <Friv src=x instance=legacy>. Thus, all frame content and scripts for a single domain appear in a common object space, just as they do in legacy SOP-only browsers. Within the legacy service instance 322, each script still has a local document reference that identifies the Friv with whose DOM the script was loaded, so that references like document.location are meaningful.
Referring to
This communication is again illustrated in diagram 404 at
1) Browser-to-Server Communication—
As noted above, the SOP protects legacy servers (e.g. those behind corporate firewalls) by confining browser-to-server communication to stay within the same SOP domain. It can be observed, however, that cross-domain browser-to-server communication (arrow 432) can be safely allowed, so long as the proposed protocol labels the request with the domain that initiated it, and ensures that any participating server understands that it must verify the domain initiating the request. In particular, any VOP-governed protocol must fail with legacy servers. In contrast, in accordance with one aspect, servers may be required to indicate their compliance by implementing a VOP communication mechanism such as JSONRequest and tagging their replies with a special MIME content type, e.g., (application/jsonrequest). The JSONRequest protocol allows the transmission of data in JSON format, which is a data-only subset of JavaScript. Under the JSONRequest mechanism, a request to a server is required to include a header indicating the source of the request, and a reply to the request is required to indicate the server is aware of the protocol and its security implications. In addition, the JSONRequest protocol disallows the automatic inclusion of cookies with request transmission to avoid a variety of subtle vulnerabilities. In one example, CommRequests can similarly prohibit automatic inclusion of cookies with requests.
2) Browser-Side Communication—
In addition, the CommRequest abstraction may provide browser-side communication across domains (arrow 433). For example, a service instance (e.g. a service instance 322) from Site B 420 may declare a port “inc”, and register a handler function to receive browser-side messages on that port:
Another domain corresponding to Site A 410 can then address a browser-side message to Site B's port using a URL scheme local that specifies Site B's SOP domain (<scheme, DNS host, TCP port> tuple) and port name:
In one example, local requests do not use HTTP, hence the special method INVOKE. Because the request is local, the implementation can forego marshaling objects into JSON or XML; instead, it need only validate that the sent object is data-only. As in JSONRequest, a data-only object is a raw data value, like an integer or string, or a dictionary or array of other data-only objects. The example false parameter specifies a synchronous request.
The port-based naming scheme works well for naming unique instances of services. If one service may be instantiated multiple times in a browser, however, then it may be important to be able to address a particular instance by its relationship to the caller. For example, suppose a page on both Site A and Site B include an instant-messaging gadget from im.com. Each parent page may communicate with its own im.com ServiceInstance to set default parameters or to negotiate Friv boundaries. To facilitate communication addressed from parent to child or vice versa, each service instance labeled with a unique number:
serviceInstance.getId( )
A service instance can then register this identifier as a port name.
A service instance wishing to address its parent can do so by constructing the destination's local: URL using these methods:
Additionally, a service instance wishing to address its child can do so with these methods on the service instance element representing the child in the parent's DOM:
Previous approaches have proposed alternative cross-domain browser-side communications mechanisms. However, said mechanisms provide only parent-to-child addressing. In contrast to various aspects disclosed herein, the previously proposed mechanisms do not provide global addressing between arbitrary browser-side components. Further, the previously proposed mechanisms reveal the full Uniform Resource Identifier (URI) of the sending document rather than only the domain thereof, which may be inappropriate if the URI of the sending document contains secret information such as session identification. Further, while the previously proposed mechanisms offer a unidirectional communication model, various aspects disclosed herein provide an asynchronous procedure call consistent with the XMLHttpRequest used in currently deployed AJAX applications.
Turning to
Abstraction for Asymmetric Trust—Sandbox
As noted above, when a service integrator 20 consumes a restrictive service, it has at least an asymmetric trust with the service. Another scenario of asymmetric trust is when an integrator 20 uses a provider's public library service. The integrator 20 may want to access the library freely, but deny or control the library's access to its own resources. In accordance with one aspect, a sandbox abstraction can be implemented for asymmetric trust. In one example, the sandbox abstraction can be utilized by a browser 30 via a sandbox tag:
The “src” file can either be a library service from a different domain or restricted content from any domains. However, a library service from the same domain may not be allowed as the integrator to be used in the tag, since if the library were not trusted by its own domain, it should not be trusted by others either. It should also be noted that an integrator 20 should take caution to sandbox third-party libraries consistently—if a third-party library is sandboxed in one application, but not sandboxed in another application of the same domain, then the library can escape the sandbox when both applications are used.
With the sandbox abstraction, although the sandboxed content cannot reach out of a sandbox 522, the enclosing page of the sandbox 522 can access everything inside the sandbox 522 by reference. This access may include reading or writing script global objects, invoking script functions, and modifying or creating DOM elements inside the sandbox 522. However, the enclosing page may not be allowed to put its own object references, or any other references that do not belong to the sandbox 522, into the sandbox 522. This is to prevent code from within the sandbox 522 to follow those references out of the sandbox 522. For example, the enclosing page is not allowed to pass its own display elements into the sandbox 522. If an integrator 20 wants to integrate a third-party library together with some of its own content 524, such as display elements that may be needed by the library, the integrator 20 may be required to create its own restricted content that includes both the library and the display elements and then sandbox that restricted service.
In one example, sandboxes 522 can be nested. A sandbox's ancestors can access everything inside the sandbox 522, while the sandbox 522 still cannot access anything outside of it. Thus, it follows that sandbox siblings cannot access one another. Any DOM elements can be enclosed inside a sandbox 522, including service instances (e.g., service instances 322). However, a service instance declared inside a sandbox 522 does not give the service instance any additional constraints. No matter where a service instance is located in a DOM tree, it always represents a service instance of a principal, which shares with other instances of the same principal the persistent state of the principal and the remote data on its web server. Therefore, the sandbox 522 cannot access any resources that belong to its child service instances.
Sandboxes 522 may be particularly useful for creating robust client mashups out of third-party library services. For each third-party library service that a service integrator 20 uses, the integrator 20 can create a restricted service enclosing the library along with its needed display DOM elements, such as div, and put the restricted service into a sandbox 522. The integrator 20 can then access and mash up content across its sandboxes 522 as it wishes without worrying about any of the library services maliciously or recklessly tampering with the integrator's content or other resources.
Abstraction for Using Restricted Services with Controlled Trust
In a scenario such as the one described above, a service instance (e.g. a service instance 322) may be used for controlled trust with restricted services 512 where an integrator 20 also wants to control its own access to restricted services 512. When the MIME type of a service instance's content indicates restricted content, the service instance may automatically disallow its content from accessing the resources of the service instance's hosting domain including XMLHTTPRequests and cookie access, in addition to HTML DOM isolation that service instance already provides. It should be appreciated that this restricted mode of the ServiceInstance abstraction is the same as the <Module> tag, except that unlike for <Module>, a service instance is allowed to communicate using both forms of the CommRequest abstraction.
Referring to
Background on XSS Vulnerabilities
XSS is a type of vulnerability found in web applications 620. In XSS, an attacker often exploits the case where a web application 620 injects user input 610 into dynamically-generated pages without first filtering the input. The injected content may be either persistent or non-persistent. As an example of a persistent injection attack, an attacker may upload a maliciously-crafted profile containing a malicious script 612 to a social networking web site. The site injects the content into pages shown to others who view the profile via a client browser 30. An injected script 612 can then run alongside application content 622 and application libraries 624 from the web application 620 with the social networking site as its domain, enabling the script 612 to make requests back to the site on behalf of the user. The notorious Samy worm that plagued myspace.com exploited persistent injection, infecting over one million myspace.com user profiles within the first twenty hours of its release.
A malicious input may also be non-persistent, simply reflected through a web server. For example, suppose a search site replies to a query x with a page that says “No results found for x.” An attacker can then trick a user into directing his browser 30 to a URL which contains a malicious script within the query x to the search site. The script in the reflected page from the search site may then run with the search site's privilege.
Existing Defense
The root causes of XSS vulnerabilities are unsanitized user input and unexpected script execution. Many existing mechanisms tackle the first cause by sanitizing user input 610. For applications 620 that take text-only user input 510, the sanitization is as simple as enforcing the user input 610 to be text, escaping special HTML tag symbols, such as “<”, into their text form, such as “<.” However, many web applications 620, such as social networking Web sites like myspace.com, demand rich user input 610 in the form of HTML. Because no conventional browser abstractions constrain the reach of an included script, these web sites typically have the policy of denying scripts in user-uploaded HTML pages. Consequently, user input sanitization involves script detection and removal. However, this turns out to be non-trivial; because browsers speak such a rich, evolving language and many browser implementations exist and vary, there are many ways of injecting a malicious script 612. In many occasions already, creative attackers have found new ways of injecting a malicious script 612. The Samy worm, for example, was notorious for discovering several holes in myspace.com's filtering mechanism.
The difficulty of exhaustive input filtering has led previous research to tackle the second root cause, preventing unexpected script execution. One previous approach proposed Browser-Enforced Embedded Policies (“BEEP”) to white-list known good scripts and adding a “noexecute” attribute to <div> elements to disallow any script execution within that element. One drawback of this approach, however, is its insecure fallback mechanism when BEEP-capable pages run in legacy browsers. For example, the “noexecute” attribute may be ignored by legacy browsers, allowing scripts in the <div> element to execute.
The reason behind Web servers' policy to disallow scripts is that existing browsers provide no way to restrict a script's behavior once it is included. The best known approach to restrict the behavior of a script is to use a cross-domain iframe to isolate user-supplied scripts. However, this approach is undesirable for several reasons. First, it requires the server to serve the scripts from a second domain to associate the scripts with a distinct domain. Second, the iframe provides an inflexible display layout. Third, under such an approach, user-supplied content cannot interact, even in a constrained way, with its containing page.
Turning now to
or a “data” URI with encoded content:
A service instance may enable flexible layout by connecting the display of the restricted content 614 to the parent container 626 with a Friv. Alternatively, a sandbox can be used, wherein the display of the DOM of the restricted content 614 is directly accessible by the parent. A service instance can communicate with its parent's client or server components using the CommRequest primitive. Likewise, a sandbox can do the same, and in addition a parent container 626 can communicate with a child sandbox by directly accessing the child's JavaScript objects.
Referring to
In one example, instead of modifying IE's source code directly, the system 700 can leverage browser extensions and public interfaces exported by IE. Additionally, it can be seen that the system 700 includes two extensions to the IE architecture 710. The first extension is a script engine proxy (SEP) 720 built from scratch using public interfaces exported by IE. As in all browsers, IE includes an HTML/CSS rendering and layout engine and various script engines including a JavaScript engine and a VBScript engine. When a script element is encountered during HTML rendering, the script element is handed to a corresponding script engine 715 for parsing and execution. Script execution may manipulate HTML DOM objects. For this purpose, the script engine 715 asks the rendering page for references to needed DOM objects. In accordance with one aspect, the SEP 720 interposes between the rendering engine and the script engines and mediates and customizes DOM object interactions. To the rendering engine of a browser, a SEP 720 serves as a script engine and exports the interface of a script engine. To the original script engine 715 of the browser, the SEP 720 serves as a rendering engine and exports the DOM interface of the rendering engine. In one example, object wrappers are used for the purpose of interposition. When a script engine 715 asks for a DOM object from the rendering engine, a SEP 720 intercepts the request, retrieves the corresponding DOM object, associates the DOM object with its wrapper object inside the SEP 720, and then passes the wrapper object back to the original script engine 715. From that point on, any invocation of the wrapper object methods from the original script engine may go through the SEP 720. In IE, a SEP 720 may take the form of a COM object and may be registered in Windows Registry associated with a scripting language (such as JScript) to serve as IE's script engine for that language. While various examples herein have focused on the JavaScript language, which is dominant in current Web applications, the techniques and browser abstractions described herein can also be readily applied to other types of languages.
In one example, the SEP 720 can take the role of implementing various protection abstractions described herein. To that end, the existing isolation mechanism, namely cross-domain frames, may be used as a building block. A ServiceInstance element may be implemented using a cross-domain frame with at least one script in it such that the SEP's interposition can be triggered on the frame. Additionally, ServiceInstances from the same domain may be segregated as cross-domain frames, though they may be allowed to access the same set of cookies. In another example, a sandbox element may also be implemented using a frame. Accessing from the outside to the inside of the frame mimics that of same-domain frames, while accessing from the inside to the outside of the frame mimics that of cross-domain frames. Each object access from within a sandbox may be further mediated to ensure that the object belongs to the sandbox and not a reference from the outside of the sandbox. The customized access control of cross-domain frames for realizing the abstractions described herein may also be realized via object wrappers as described above.
The second extension is a MIME filter 730, which can serve as an asynchronous pluggable protocol handler at the software layer of URLMon.dll where various content (i.e., MIME) types are handled. The MIME filter 730 may take an input HTML stream and output a transformed HTML stream to the next software layer in IE. In one example, the MIME filter 730 is used to translate new tags into existing tags, such as iframe and script. Further, special JavaScript comments inside an empty script element may be used to indicate the original tags and attributes to the SEP 720. For example,
may be translated by the MIME filter 730 to
The comments inside the script element inform the SEP 720 that the iframe with name “untrustedSandbox” should be treated as a sandbox. In one example, a similar translation can occur with respect to service instances.
In accordance with one aspect, CommRequest-based communication primitives may be implemented by providing two runtime objects CommServer and CommRequest in conjunction with one or more communication methods described above. For access control on XMLHTTPRequest, particularly for restricted mode ServiceInstances and Sandboxes, the above object wrapper mechanism can again be used for interception. In accordance with another aspect, Friv may be implemented using iframe as well. CommRequest can be used to carry out the automatic negotiation on the frame width and height between a Friv and its parent.
As can be observed from the above discussion with regard to system 700, script engine proxies can serve as a great platform for experimenting with new browser features. The fact that the above-mentioned abstractions could be implemented on the platform illustrated by system 700 along with the MIME filter 730 indicates that they should also be readily implementable in existing browsers.
Referring now to
Turning to
The invention may be described in the general context of computer-executable instructions, such as program modules, executed by one or more components. Generally, program modules include routines, programs, objects, data structures, etc., that perform particular tasks or implement particular abstract data types. Typically, the functionality of the program modules may be combined or distributed as desired in various embodiments. As will be appreciated, various portions of the disclosed systems above and methods below may include or consist of artificial intelligence or knowledge or rule based components, sub-components, processes, means, methodologies, or mechanisms (e.g., support vector machines, neural networks, expert systems, Bayesian belief networks, fuzzy logic, data fusion engines, classifiers, etc.). Such components can automate certain mechanisms or processes performed thereby to make portions of the systems and methods more adaptive as well as efficient and intelligent.
Referring to
Referring now to
Turning to
Referring to
In order to provide additional context for various aspects of the subject invention,
A computer typically includes a variety of computer-readable media. Computer-readable media can be any available media that can be accessed by the computer and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer-readable media can comprise computer storage media and communication media. Computer storage media can include both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer.
Communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism, and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer-readable media.
With reference again to
The system bus 1308 can be any of several types of bus structure that may further interconnect to a memory bus (with or without a memory controller), a peripheral bus, and a local bus using any of a variety of commercially available bus architectures. The system memory 1306 includes read-only memory (ROM) 1310 and random access memory (RAM) 1312. A basic input/output system (BIOS) is stored in a non-volatile memory 1310 such as ROM, EPROM, EEPROM, which BIOS contains the basic routines that help to transfer information between elements within the computer 1302, such as during start-up. The RAM 1312 can also include a high-speed RAM such as static RAM for caching data.
The computer 1302 further includes an internal hard disk drive (HDD) 1314 (e.g., EIDE, SATA) that may also be configured for external use in a suitable chassis (not shown), a magnetic floppy disk drive (FDD) 1316, (e.g., to read from or write to a removable diskette 1318) and an optical disk drive 1320, (e.g., reading a CD-ROM disk 1322 or, to read from or write to other high capacity optical media such as the DVD). The hard disk drive 1314, magnetic disk drive 1316 and optical disk drive 1320 can be connected to the system bus 1308 by a hard disk drive interface 1324, a magnetic disk drive interface 1326 and an optical drive interface 1328, respectively. The interface 1324 for external drive implementations includes at least one or both of Universal Serial Bus (USB) and IEEE-1394 interface technologies. Other external drive connection technologies are within contemplation of the subject invention.
The drives and their associated computer-readable media provide nonvolatile storage of data, data structures, computer-executable instructions, and so forth. For the computer 1302, the drives and media accommodate the storage of any data in a suitable digital format. Although the description of computer-readable media above refers to a HDD, a removable magnetic diskette, and a removable optical media such as a CD or DVD, it should be appreciated by those skilled in the art that other types of media which are readable by a computer, such as zip drives, magnetic cassettes, flash memory cards, cartridges, and the like, may also be used in the exemplary operating environment, and further, that any such media may contain computer-executable instructions for performing the methods of the invention.
A number of program modules can be stored in the drives and RAM 1312, including an operating system 1330, one or more application programs 1332, other program modules 1334 and program data 1336. All or portions of the operating system, applications, modules, and/or data can also be cached in the RAM 1312. It should be appreciated that the invention can be implemented with various commercially available operating systems or combinations of operating systems.
A user can enter commands and information into the computer 1302 through one or more wired/wireless input devices, e.g. a keyboard 1338 and a pointing device, such as a mouse 1340. Other input devices (not shown) may include a microphone, an IR remote control, a joystick, a game pad, a stylus pen, touch screen, or the like. These and other input devices are often connected to the processing unit 1304 through an input device interface 1342 that is coupled to the system bus 1308, but can be connected by other interfaces, such as a parallel port, a serial port, an IEEE-1394 port, a game port, a USB port, an IR interface, etc.
A monitor 1344 or other type of display device is also connected to the system bus 1308 via an interface, such as a video adapter 1346. In addition to the monitor 1344, a computer typically includes other peripheral output devices (not shown), such as speakers, printers, etc.
The computer 1302 may operate in a networked environment using logical connections via wired and/or wireless communications to one or more remote computers, such as a remote computer(s) 1348. The remote computer(s) 1348 can be a workstation, a server computer, a router, a personal computer, portable computer, microprocessor-based entertainment appliance, a peer device or other common network node, and typically includes many or all of the elements described relative to the computer 1302, although, for purposes of brevity, only a memory/storage device 1350 is illustrated. The logical connections depicted include wired/wireless connectivity to a local area network (LAN) 1352 and/or larger networks, e.g. a wide area network (WAN) 1354. Such LAN and WAN networking environments are commonplace in offices and companies, and facilitate enterprise-wide computer networks, such as intranets, all of which may connect to a global communications network, e.g., the Internet.
When used in a LAN networking environment, the computer 1302 is connected to the local network 1352 through a wired and/or wireless communication network interface or adapter 1356. The adapter 1356 may facilitate wired or wireless communication to the LAN 1352, which may also include a wireless access point disposed thereon for communicating with the wireless adapter 1356.
When used in a WAN networking environment, the computer 1302 can include a modem 1358, or is connected to a communications server on the WAN 1354, or has other means for establishing communications over the WAN 1354, such as by way of the Internet. The modem 1358, which can be internal or external and a wired or wireless device, is connected to the system bus 1308 via the serial port interface 1342. In a networked environment, program modules depicted relative to the computer 1302, or portions thereof, can be stored in the remote memory/storage device 1350. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers can be used.
The computer 1302 is operable to communicate with any wireless devices or entities operatively disposed in wireless communication, e.g., a printer, scanner, desktop and/or portable computer, portable data assistant, communications satellite, telephone, etc. This includes at least Wi-Fi and Bluetooth™ wireless technologies. Thus, the communication can be a predefined structure as with a conventional network or simply an ad hoc communication between at least two devices.
Wi-Fi, or Wireless Fidelity, is a wireless technology similar to that used in a cell phone that enables a device to send and receive data anywhere within the range of a base station. Wi-Fi networks use IEEE-802.11 (a, b, g, etc.) radio technologies to provide secure, reliable, and fast wireless connectivity. A Wi-Fi network can be used to connect computers to each other, to the Internet, and to wired networks (which use IEEE-802.3 or Ethernet). Wi-Fi networks operate in the unlicensed 2.4 and 5 GHz radio bands, at an 11 Mbps (802.11a) or 54 Mbps (802.11b) data rate, for example, or with products that contain both bands (dual band). Thus, networks using Wi-Fi wireless technology can provide real-world performance similar to a 10BaseT wired Ethernet network.
Referring now to
Communications can be facilitated via a wired (including optical fiber) and/or wireless technology. The client(s) 1402 are operatively connected to one or more client data store(s) 1408 that can be employed to store information local to the client(s) 1402. Similarly, the server(s) 1404 are operatively connected to one or more server data store(s) 1410 that can be employed to store information local to the servers 1404.
What has been described above includes examples of the present invention. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the present invention, but one of ordinary skill in the art may recognize that many further combinations and permutations of the present invention are possible. Accordingly, the present invention is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims. Furthermore, to the extent that the term “includes” is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term “comprising” as “comprising” is interpreted when employed as a transitional word in a claim.
Furthermore, the aforementioned systems have been described with respect to interaction between several components. It can be appreciated that such systems and components can include those components or specified sub-components, some of the specified components or sub-components, and/or additional components, according to various permutations and combinations of the foregoing. Sub-components can also be implemented as components communicatively coupled to other components rather than included within parent components, e.g., according to a hierarchical arrangement. Additionally, it should be noted that one or more components may be combined into a single component providing aggregate functionality or divided into several separate sub-components, and any one or more middle layers, such as a management layer, may be provided to communicatively couple to such sub-components in order to provide integrated functionality. Any components described herein may also interact with one or more other components not specifically described herein but generally known by those of skill in the art.
Number | Name | Date | Kind |
---|---|---|---|
4227253 | Ehrsam et al. | Oct 1980 | A |
4654799 | Ogaki et al. | Mar 1987 | A |
4688169 | Joshi | Aug 1987 | A |
4796220 | Wolfe | Jan 1989 | A |
4982430 | Frezza et al. | Jan 1991 | A |
4984272 | McIlroy et al. | Jan 1991 | A |
5210874 | Karger | May 1993 | A |
5222134 | Waite et al. | Jun 1993 | A |
5339422 | Brender et al. | Aug 1994 | A |
5377188 | Seki | Dec 1994 | A |
5390314 | Swanson | Feb 1995 | A |
5428529 | Hartrick et al. | Jun 1995 | A |
5623604 | Russell et al. | Apr 1997 | A |
5644709 | Austin | Jul 1997 | A |
5659539 | Porter et al. | Aug 1997 | A |
5666519 | Hayden | Sep 1997 | A |
5675762 | Bodin et al. | Oct 1997 | A |
5689566 | Nguyen | Nov 1997 | A |
5729710 | Magee et al. | Mar 1998 | A |
5771383 | Magee et al. | Jun 1998 | A |
5799090 | Angell | Aug 1998 | A |
5805829 | Cohen et al. | Sep 1998 | A |
5812394 | Lewis et al. | Sep 1998 | A |
5812668 | Weber | Sep 1998 | A |
5842017 | Hookway et al. | Nov 1998 | A |
5850446 | Berger et al. | Dec 1998 | A |
5892904 | Atkinson et al. | Apr 1999 | A |
5931900 | Notani et al. | Aug 1999 | A |
5941947 | Brown et al. | Aug 1999 | A |
5949882 | Angelo | Sep 1999 | A |
5974549 | Golan | Oct 1999 | A |
5983348 | Ji | Nov 1999 | A |
5987523 | Hind et al. | Nov 1999 | A |
5987611 | Freund | Nov 1999 | A |
5995945 | Notani et al. | Nov 1999 | A |
6006228 | McCollum et al. | Dec 1999 | A |
6029245 | Scanlan | Feb 2000 | A |
6041309 | Laor | Mar 2000 | A |
6076109 | Kikinis | Jun 2000 | A |
6092194 | Touboul | Jul 2000 | A |
6154844 | Touboul et al. | Nov 2000 | A |
6158007 | Moreh et al. | Dec 2000 | A |
6161139 | Win et al. | Dec 2000 | A |
6253326 | Lincke et al. | Jun 2001 | B1 |
6266681 | Guthrie | Jul 2001 | B1 |
6272641 | Ji | Aug 2001 | B1 |
6275937 | Hailpern et al. | Aug 2001 | B1 |
6275938 | Bond et al. | Aug 2001 | B1 |
6279111 | Jensenworth et al. | Aug 2001 | B1 |
6311269 | Luckenbaugh et al. | Oct 2001 | B2 |
6321334 | Jerger et al. | Nov 2001 | B1 |
6339423 | Sampson et al. | Jan 2002 | B1 |
6343362 | Ptacek et al. | Jan 2002 | B1 |
6345361 | Jerger et al. | Feb 2002 | B1 |
6351816 | Mueller et al. | Feb 2002 | B1 |
6366912 | Wallent et al. | Apr 2002 | B1 |
6385301 | Notting et al. | May 2002 | B1 |
6430561 | Austel et al. | Aug 2002 | B1 |
6457130 | Hitz et al. | Sep 2002 | B2 |
6460079 | Blumenau | Oct 2002 | B1 |
6473800 | Jerger et al. | Oct 2002 | B1 |
6490626 | Edwards et al. | Dec 2002 | B1 |
6516308 | Cohen | Feb 2003 | B1 |
6519647 | Howard et al. | Feb 2003 | B1 |
6526513 | Shrader et al. | Feb 2003 | B1 |
6546546 | Van Doorn | Apr 2003 | B1 |
6553393 | Eilbott et al. | Apr 2003 | B1 |
6553410 | Kikinis | Apr 2003 | B2 |
6584186 | Aravamudan et al. | Jun 2003 | B1 |
6591265 | Erickson et al. | Jul 2003 | B1 |
6594664 | Estrada et al. | Jul 2003 | B1 |
6598046 | Goldberg et al. | Jul 2003 | B1 |
6601233 | Underwood | Jul 2003 | B1 |
6609198 | Wood et al. | Aug 2003 | B1 |
6629081 | Cornelius et al. | Sep 2003 | B1 |
6629246 | Gadi | Sep 2003 | B1 |
6636889 | Estrada et al. | Oct 2003 | B1 |
6636972 | Ptacek et al. | Oct 2003 | B1 |
6662341 | Cooper et al. | Dec 2003 | B1 |
6691153 | Hanson et al. | Feb 2004 | B1 |
6691230 | Bardon | Feb 2004 | B1 |
6701376 | Haverstock et al. | Mar 2004 | B1 |
6711675 | Spiegel et al. | Mar 2004 | B1 |
6724406 | Kelley | Apr 2004 | B1 |
6728762 | Estrada et al. | Apr 2004 | B1 |
6748425 | Duffy et al. | Jun 2004 | B1 |
6754702 | Kennelly et al. | Jun 2004 | B1 |
6772167 | Snavely et al. | Aug 2004 | B1 |
6772345 | Shetty | Aug 2004 | B1 |
6772393 | Estrada et al. | Aug 2004 | B1 |
6779120 | Valente et al. | Aug 2004 | B1 |
6785790 | Christie et al. | Aug 2004 | B1 |
6789170 | Jacobs et al. | Sep 2004 | B1 |
6789204 | Abdelnur et al. | Sep 2004 | B2 |
6792113 | Ansell et al. | Sep 2004 | B1 |
6799208 | Sankaranarayan et al. | Sep 2004 | B1 |
6801224 | Lewallen et al. | Oct 2004 | B1 |
6820261 | Bloch | Nov 2004 | B1 |
6823433 | Barnes et al. | Nov 2004 | B1 |
6826716 | Mason | Nov 2004 | B2 |
6850252 | Hoffberg | Feb 2005 | B1 |
6854039 | Strongin et al. | Feb 2005 | B1 |
6871321 | Wakayama | Mar 2005 | B2 |
6898618 | Slaughter et al. | May 2005 | B1 |
6931532 | Davis et al. | Aug 2005 | B1 |
6934757 | Kalantar et al. | Aug 2005 | B1 |
6941459 | Hind et al. | Sep 2005 | B1 |
6959336 | Moreh et al. | Oct 2005 | B2 |
6961849 | Davis et al. | Nov 2005 | B1 |
6978367 | Hind et al. | Dec 2005 | B1 |
7003734 | Gardner et al. | Feb 2006 | B1 |
7010681 | Fletcher et al. | Mar 2006 | B1 |
7051366 | LaMacchia et al. | May 2006 | B1 |
7051368 | Howard et al. | May 2006 | B1 |
7069554 | Stammers et al. | Jun 2006 | B1 |
7093244 | Lajoie et al. | Aug 2006 | B2 |
7185210 | Faden | Feb 2007 | B1 |
7188363 | Boutros et al. | Mar 2007 | B1 |
7191252 | Redlich et al. | Mar 2007 | B2 |
7194744 | Srivastava et al. | Mar 2007 | B2 |
7203749 | Hiraga | Apr 2007 | B2 |
7240015 | Karmouch et al. | Jul 2007 | B1 |
7263561 | Green et al. | Aug 2007 | B1 |
7281132 | Bender et al. | Oct 2007 | B2 |
7308648 | Buchthal et al. | Dec 2007 | B1 |
7318238 | Elvanoglu et al. | Jan 2008 | B2 |
7328435 | Trifon | Feb 2008 | B2 |
7343419 | Robinson | Mar 2008 | B1 |
7346649 | Wong | Mar 2008 | B1 |
7370351 | Ramachandran et al. | May 2008 | B1 |
7392545 | Weber et al. | Jun 2008 | B1 |
7398533 | Slaughter et al. | Jul 2008 | B1 |
7406502 | Oliver et al. | Jul 2008 | B1 |
7478434 | Hinton et al. | Jan 2009 | B1 |
7480907 | Marolia et al. | Jan 2009 | B1 |
7484247 | Rozman et al. | Jan 2009 | B2 |
7475404 | Hamel | Jun 2009 | B2 |
7562382 | Hinton et al. | Jul 2009 | B2 |
7600224 | Obayashi et al. | Oct 2009 | B2 |
7650617 | Hoshino et al. | Jan 2010 | B2 |
7729992 | Rose | Jun 2010 | B2 |
7792964 | Franco | Sep 2010 | B2 |
8078740 | Franco et al. | Dec 2011 | B2 |
20010013096 | Luckenbaugh et al. | Aug 2001 | A1 |
20010016907 | Kang et al. | Aug 2001 | A1 |
20010039622 | Hitz et al. | Nov 2001 | A1 |
20010043237 | Schmieder | Nov 2001 | A1 |
20010049671 | Joerg | Dec 2001 | A1 |
20010054049 | Maeda et al. | Dec 2001 | A1 |
20020010679 | Felsher | Jan 2002 | A1 |
20020010855 | Reshef et al. | Jan 2002 | A1 |
20020019936 | Hitz et al. | Feb 2002 | A1 |
20020019941 | Chan | Feb 2002 | A1 |
20020046290 | Andersson et al. | Apr 2002 | A1 |
20020069200 | Cooper et al. | Jun 2002 | A1 |
20020073119 | Richard | Jun 2002 | A1 |
20020073197 | Bhogal et al. | Jun 2002 | A1 |
20020087479 | Malcolm | Jul 2002 | A1 |
20020099952 | Lambert et al. | Jul 2002 | A1 |
20020104023 | Hewett et al. | Aug 2002 | A1 |
20020107889 | Stone et al. | Aug 2002 | A1 |
20020107890 | Gao et al. | Aug 2002 | A1 |
20020112155 | Martherus et al. | Aug 2002 | A1 |
20020124181 | Nambu | Sep 2002 | A1 |
20020129239 | Clark | Sep 2002 | A1 |
20020129281 | Hatfalvi | Sep 2002 | A1 |
20020147923 | Dotan | Oct 2002 | A1 |
20020166052 | Garg et al. | Nov 2002 | A1 |
20020178375 | Whittaker et al. | Nov 2002 | A1 |
20020184520 | Bush et al. | Dec 2002 | A1 |
20020188689 | Chung | Dec 2002 | A1 |
20020188869 | Patrick | Dec 2002 | A1 |
20030002526 | Dias et al. | Jan 2003 | A1 |
20030023445 | Trifon | Jan 2003 | A1 |
20030023774 | Gladstone et al. | Jan 2003 | A1 |
20030023880 | Edwards et al. | Jan 2003 | A1 |
20030025727 | Rath et al. | Feb 2003 | A1 |
20030028655 | Owhadi | Feb 2003 | A1 |
20030037236 | Simon et al. | Feb 2003 | A1 |
20030037261 | Meffert et al. | Feb 2003 | A1 |
20030051027 | Aupperle et al. | Mar 2003 | A1 |
20030051142 | Hidalgo et al. | Mar 2003 | A1 |
20030061482 | Emmerichs | Mar 2003 | A1 |
20030061512 | Flurry et al. | Mar 2003 | A1 |
20030088807 | Mathiske et al. | May 2003 | A1 |
20030093464 | Clough et al. | May 2003 | A1 |
20030093666 | Millen et al. | May 2003 | A1 |
20030097591 | Pham et al. | May 2003 | A1 |
20030135504 | Elvanoglu et al. | Jul 2003 | A1 |
20030149781 | Yared et al. | Aug 2003 | A1 |
20030163448 | Kilemba et al. | Aug 2003 | A1 |
20030172293 | Johnson et al. | Sep 2003 | A1 |
20030177226 | Garg et al. | Sep 2003 | A1 |
20030177389 | Albert et al. | Sep 2003 | A1 |
20030177390 | Radhakrishnan | Sep 2003 | A1 |
20030177400 | Raley | Sep 2003 | A1 |
20030229501 | Copeland et al. | Dec 2003 | A1 |
20040006706 | Erlingsson | Jan 2004 | A1 |
20040025060 | Raffaele et al. | Feb 2004 | A1 |
20040034794 | Mayer et al. | Feb 2004 | A1 |
20040039752 | Goldfuss et al. | Feb 2004 | A1 |
20040041836 | Zaner | Mar 2004 | A1 |
20040054791 | Chakraborty et al. | Mar 2004 | A1 |
20040073811 | Sanin | Apr 2004 | A1 |
20040078577 | Feng et al. | Apr 2004 | A1 |
20040078591 | Teixeira et al. | Apr 2004 | A1 |
20040103200 | Ross et al. | May 2004 | A1 |
20040103203 | Nichols et al. | May 2004 | A1 |
20040109410 | Chase et al. | Jun 2004 | A1 |
20040123157 | Alagna et al. | Jun 2004 | A1 |
20040151323 | Olkin et al. | Aug 2004 | A1 |
20040167964 | Rounthwaite et al. | Aug 2004 | A1 |
20040187031 | Liddle | Sep 2004 | A1 |
20040199603 | Tafla et al. | Oct 2004 | A1 |
20040199763 | Freund | Oct 2004 | A1 |
20040205342 | Roegner | Oct 2004 | A1 |
20040210536 | Gudelj et al. | Oct 2004 | A1 |
20040215731 | Tzann-en Szeto | Oct 2004 | A1 |
20040230825 | Shepherd et al. | Nov 2004 | A1 |
20040239700 | Baschy | Dec 2004 | A1 |
20040239703 | Angelica | Dec 2004 | A1 |
20040254812 | Horstemeyer et al. | Dec 2004 | A1 |
20040260754 | Olson et al. | Dec 2004 | A1 |
20040268139 | Christian et al. | Dec 2004 | A1 |
20040268322 | Chow | Dec 2004 | A1 |
20050015752 | Alpern et al. | Jan 2005 | A1 |
20050022012 | Bluestone et al. | Jan 2005 | A1 |
20050055458 | Mohan et al. | Mar 2005 | A1 |
20050055570 | Kwan et al. | Mar 2005 | A1 |
20050066290 | Chebolu et al. | Mar 2005 | A1 |
20050066311 | Hagmeier et al. | Mar 2005 | A1 |
20050071616 | Zimmber et al. | Mar 2005 | A1 |
20050091536 | Whitmer et al. | Apr 2005 | A1 |
20050108518 | Pandya | May 2005 | A1 |
20050114430 | Zheng et al. | May 2005 | A1 |
20050120242 | Mayer et al. | Jun 2005 | A1 |
20050149726 | Joshi et al. | Jul 2005 | A1 |
20050154885 | Viscomi et al. | Jul 2005 | A1 |
20050177635 | Schmidt et al. | Aug 2005 | A1 |
20050182924 | Sauve et al. | Aug 2005 | A1 |
20050182928 | Kamalanathan et al. | Aug 2005 | A1 |
20050193329 | Kickel | Sep 2005 | A1 |
20050198153 | Keohane et al. | Sep 2005 | A1 |
20050204041 | Blinn et al. | Sep 2005 | A1 |
20050216582 | Toomey et al. | Sep 2005 | A1 |
20050222902 | Coit et al. | Oct 2005 | A1 |
20050223412 | Nadalin et al. | Oct 2005 | A1 |
20050223413 | Duggan et al. | Oct 2005 | A1 |
20050235200 | Goldberg | Oct 2005 | A1 |
20050256924 | Chory et al. | Nov 2005 | A1 |
20050256960 | Ganesh | Nov 2005 | A1 |
20050259655 | Cuervo et al. | Nov 2005 | A1 |
20050259674 | Cuervo et al. | Nov 2005 | A1 |
20050262232 | Cuervo et al. | Nov 2005 | A1 |
20050267870 | Everett-Church et al. | Dec 2005 | A1 |
20050268214 | Lu | Dec 2005 | A1 |
20050283719 | Awamoto et al. | Dec 2005 | A1 |
20050283828 | Perley et al. | Dec 2005 | A1 |
20060010134 | Davis et al. | Jan 2006 | A1 |
20060010241 | Kudallur | Jan 2006 | A1 |
20060015728 | Ballinger et al. | Jan 2006 | A1 |
20060020538 | Ram et al. | Jan 2006 | A1 |
20060020679 | Hinton et al. | Jan 2006 | A1 |
20060026667 | Bhide et al. | Feb 2006 | A1 |
20060031347 | Sahi | Feb 2006 | A1 |
20060031404 | Kassab | Feb 2006 | A1 |
20060036746 | Davis | Feb 2006 | A1 |
20060041636 | Ballinger et al. | Feb 2006 | A1 |
20060041834 | Chen et al. | Feb 2006 | A1 |
20060047959 | Morais | Mar 2006 | A1 |
20060053048 | Tandetnik | Mar 2006 | A1 |
20060053224 | Subramaniam | Mar 2006 | A1 |
20060053411 | Takamiya et al. | Mar 2006 | A1 |
20060056431 | Toyoda et al. | Mar 2006 | A1 |
20060069613 | Marquardt | Mar 2006 | A1 |
20060069737 | Gilhuly et al. | Mar 2006 | A1 |
20060070066 | Grobman | Mar 2006 | A1 |
20060095526 | Levergood et al. | May 2006 | A1 |
20060123244 | Gheorghescu et al. | Jun 2006 | A1 |
20060136590 | Barett et al. | Jun 2006 | A1 |
20060143688 | Futoransky | Jun 2006 | A1 |
20060150256 | Fanton et al. | Jul 2006 | A1 |
20060155780 | Sakairi et al. | Jul 2006 | A1 |
20060185021 | Dujari et al. | Aug 2006 | A1 |
20060259955 | Gunther et al. | Nov 2006 | A1 |
20060271425 | Goodman et al. | Nov 2006 | A1 |
20060277218 | Brown et al. | Dec 2006 | A1 |
20070016949 | Dunagan et al. | Jan 2007 | A1 |
20070016954 | Choi | Jan 2007 | A1 |
20070027779 | Bhambri et al. | Feb 2007 | A1 |
20070028185 | Bhogal et al. | Feb 2007 | A1 |
20070050854 | Cooperstein et al. | Mar 2007 | A1 |
20070124797 | Gupta et al. | Mar 2007 | A1 |
20070094712 | Gibbs et al. | Apr 2007 | A1 |
20070100830 | Beedubail et al. | May 2007 | A1 |
20070100915 | Rose | May 2007 | A1 |
20070101258 | Xu et al. | May 2007 | A1 |
20070101435 | Konanka et al. | May 2007 | A1 |
20070106650 | Moore | May 2007 | A1 |
20070107057 | Chander et al. | May 2007 | A1 |
20070113237 | Hickson | May 2007 | A1 |
20070113282 | Ross | May 2007 | A1 |
20070124693 | Dominowska et al. | May 2007 | A1 |
20070136579 | Levy et al. | Jun 2007 | A1 |
20070136811 | Gruzman et al. | Jun 2007 | A1 |
20070146812 | Lawton | Jun 2007 | A1 |
20070174419 | O'Connell et al. | Jul 2007 | A1 |
20070180490 | Renzi et al. | Aug 2007 | A1 |
20070192839 | Fee et al. | Aug 2007 | A1 |
20070199000 | Shekhel et al. | Aug 2007 | A1 |
20070199050 | Meier | Aug 2007 | A1 |
20070208822 | Wang et al. | Sep 2007 | A1 |
20070214503 | Shulman et al. | Sep 2007 | A1 |
20070245310 | Rosenstein et al. | Oct 2007 | A1 |
20070256003 | Wagoner et al. | Nov 2007 | A1 |
20070260495 | MacE et al. | Nov 2007 | A1 |
20070261037 | Bendapudi | Nov 2007 | A1 |
20070271342 | Brandt et al. | Nov 2007 | A1 |
20070299857 | Gwozdz et al. | Dec 2007 | A1 |
20070300064 | Isaacs et al. | Dec 2007 | A1 |
20080005282 | Gaedcke | Jan 2008 | A1 |
20080010615 | Curtis et al. | Jan 2008 | A1 |
20080046519 | Tonnison et al. | Feb 2008 | A1 |
20080046562 | Butler | Feb 2008 | A1 |
20080262913 | Reitz et al. | Oct 2008 | A1 |
20080301643 | Appleton et al. | Dec 2008 | A1 |
20080313648 | Wang et al. | Dec 2008 | A1 |
20090037517 | Frei | Feb 2009 | A1 |
20090037806 | Yang et al. | Feb 2009 | A1 |
20090043739 | Choi | Feb 2009 | A1 |
20090070872 | Cowings et al. | Mar 2009 | A1 |
20090083714 | Kiciman et al. | Mar 2009 | A1 |
20090132713 | Dutta et al. | May 2009 | A1 |
20090183171 | Isaacs et al. | Jul 2009 | A1 |
20090183227 | Isaacs et al. | Jul 2009 | A1 |
20090187918 | Chen et al. | Jul 2009 | A1 |
20090265760 | Zhu et al. | Oct 2009 | A1 |
20090276835 | Jackson et al. | Nov 2009 | A1 |
20090299862 | Fan et al. | Dec 2009 | A1 |
20090300496 | Fan et al. | Dec 2009 | A1 |
20090327869 | Fan et al. | Dec 2009 | A1 |
20100058293 | Dunagan | Mar 2010 | A1 |
Number | Date | Country |
---|---|---|
1299478 | Jun 2001 | CN |
1366239 | Aug 2002 | CN |
0646865 | Apr 1995 | EP |
0667572 | Aug 1995 | EP |
1420562 | May 2004 | EP |
HK1119321 | Feb 2009 | HK |
2001325249 | Nov 2001 | JP |
20070102859 | Oct 2007 | KR |
9407204 | Mar 1994 | WO |
0153965 | Jul 2001 | WO |
0213026 | Feb 2002 | WO |
02019076 | Mar 2002 | WO |
0239237 | May 2002 | WO |
03073240 | Sep 2003 | WO |
2005008456 | Jan 2005 | WO |
2008002456 | Jan 2008 | WO |
2008036969 | Mar 2008 | WO |
2009088685 | Jul 2009 | WO |
Entry |
---|
Wang, et al. “Protection and Communication Abstractions for Web Browsers in MashupOS” (2007) SOSP'07, 14 pages. |
“About URL Security Zones” Available at http://nsdn.microsoftcom/en-us/library/ms537183%28VS.85%29.aspx, Jan. 23, 2008, 10 pages. |
“Access Management and Single Sign-On for Web and J2EE Environments,” Available at http://www.entegrity.com/products/aa/aa.shtml , Feb. 6, 2005, 1 page. |
Ad Blocking Resources, retrieved from the Internet on Aug. 17, 2005: https://netfiles.uiuc.edu/ehowes/www/resource.htm, 20 pages. |
“Advisory Action”, U.S. Appl. No. 11/426,785, Informed in an email that this case is related, dated May 26, 2010, 3 pages. |
Anupam, et al. “Secure Web Scripting,” IEEE Internet Computing, vol. 2, Issue 6, ISSN:1089-7801, Nov. 1998, 15 pages. |
Barth, et al. “Securing Frame Communication in Browsers,” 2008, 14 pages. |
Bershad, et al. “Lightweight Remote Procedure Call,” ACM Transactions on Computer Systems, vol. 8, No. 1, Feb. 1990, pp. 37-55. |
Bertino, et al. On Specifying Security Policies for Web Documents with an XML-based Language. Symposium on Access Control Models and Technologies—SACMAT, Retrieved from http://isrl.cs.byu.edu/pubs/X-secIntro.pdf, May 2001, 9 pages. |
“BPAI Decision” U.S. Appl. No. 10/606,089, dated Aug. 25, 2010, 8 pages. |
“CERTAdvisory CA-2000-02 Malicious HTML Tags Embedded in Client Web Requests,” Feb. 2000, Carnegie Mellon University, http://www.cert.org/advisories/CA-2000-02.html. Last accessed Mar. 2, 2011, 4 pages. |
CERT.org, Understanding Malicious Content Mitigation for Web Developers, Feb. 2000, http://www.cert.org/tech.sub.--tips/malicious.sub.--code.sub.--mitigation- .html. |
Chang. “An Adaptive Distributed Object Framework for the Web,” Available at http://csl.cs.uiuc.edu/docs/ecoop-phd04/main.pdf, Jun. 14-15, 2004, 10 pages. |
Chen. “Light-Weight Transparent Defence Against Browser Cross-Frame Attacks Using Script Accenting,” Technical Report—MSR-TR-2007-29, Mar. 14, 2007, http://ftp.research.microsoft.com/pub/tr/TR-2007-29.pdf. Last accessed Oct. 5, 2007, 16 pages. |
Chen, et al. “A Systematic Approach to Uncover Security Flaws in GUI Logic,” IEEE Symposium on Security and Privacy, May 2007, 15 pages. |
Chess, et al. “JavaScript Hijacking,” Fortify Software, Mar. 12, 2007, 10 pages. |
CNOA dated Jun. 19, 2009 for Chinese Patent Application No. 200680031682.6, 12 pages. |
CNOA dated Aug. 4, 2010 for Chinese Patent Application No. 200680019185.4, 13 pages. |
CNOA dated Sep. 13, 2010 for Chinese Patent Application No. 200680031682.6, 16 pages. |
“Content Restrictions,” Version 0.9.2, Mar. 20, 2007, http://www.gerv.net/security/content-restrictions/ , Mar. 20, 2007, 3 pages. |
Couvreur. “Curiosity is Bliss: Web API Authentication for Mashups,” Available at http://blog.monstuff.com/archives/000296.html, Jun. 25, 2006, 5 pages. |
Edwards. “The Guide to Internet Explorer Security Zones,” Retrieved from http://www.windowsitpro.com/article/internet/the-guide-to-internet-explorer-security-zones.aspx on Dec. 7, 2010, (Jan. 2000), 3 pages. |
“Enterprise Start pp. And Mashup Applications Online,” Available at http://datamashups.com retrieved on Jan. 28. 2008, (2006), 2 pages. |
Erlingsson, et al. “End-to-End Web Application Security,” Available at http://www.usenix.org/events/hotos07/tech/fullpapers/erlingsson/erlingsson_html/, Apr. 2007, 6 pages. |
“eTrust Access Control,” Available at http://www3.ca.com/solutions/Product/aspx?ID=154, Jun. 8, 2001, 2 pages. |
Evans. “Policy-Directed Code Safety,” Available at http://www.cs.virginia.edu/-evans/phd-thesis/thesis.ps.gz, Feb. 2000, 137 pages. |
Fettig. “How to make XMLHttpRequest Calls to Another Server in Your Domain,” http://ajaxian.com/archives/how-to-make-xmlhttprequest-calls-to-another-server-in-your-domain. Last accessed Oct. 28, 2010, (Nov. 29, 2005), 2 pages. |
“From Coffee to Celebrity Sightings: How Mashups are Changing Online Mapping,” Spunlogic 2007, www.spunlogic.com, 2007, 6 pages. |
Gong, et al. “Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2” Proc. of the USENIX Symp. on Internet Technologies and Systems, Monterey, CA, USA, Dec. 1997, 10 pages. |
Hallam-Baker. “X-TASS: XML Trust Assertion Service Specification,” Jan. 5, 2001, Verisign, version 0.9, Retrieved from http://www.oasis-open.org/committees/security/docs/draft-xtass-v09.pdf, Jan. 5, 2001, 26 pages. |
Howell, et al. “MashupsOS: Operating System Abstractions for Client Mashups,” Proc. 11th USENIX workshop on Hot Topics in Operating Systems , 2007, 7 pages. |
“IBM Tivoli Federated Identity Manager,” Available at http://www-01.ibm.com/software/tivoli/products/federated-identity-mgr/, Nov. 9, 2005, 5 pages. |
IEBLOG “Using Frames More Securely,” Available at http://blogs.msdn.com/ie/archive/2008/01/18/using-frames-more-securely.aspx, Jan. 18, 2008, 19 pages. |
International Search Report dated Jan. 8, 2007 for PCT Application No. PCT/US2006/033823, 2 pages. |
“PCT Search Report and Written Opinion,” Application No. PCT/ US06/ 18752, dated Aug. 31, 2007, 7 pages. |
International Search Report dated Jan. 25, 2009 for PCT Application No. PCT/ US2008/087265, 1 page. |
International Search Report and Written Opinion for PCT/2008-062763, dated Sep. 22, 2008, 12 pages. |
International Search Report dated Dec. 8, 1998 for PCT Application No. PCT/ US 98/17553, 3 pages. |
International Search Report filed May 30, 2009, dated Dec. 22, 2009 for for PCT Application No. PCT/US2009/045765, 9 pages. |
Jim Trevor, et al. “Defeating Script Injection Attacks with Browser-Enforced Embedded Policies,” Proc. WWW 2007, May 2007, pp. 601-610. |
Johansson, et al. “Dealing with Contextual Vulnerabilities in Code: Distinguishing between Solutions and Pseudosolutions,” Computers and Security, vol. 22, 2003, pp. 152-159. |
Jose, et al. “Integrated Context Management for Multi-Domain Pervasive Environments,” MCMP-05, Available at <https://repositorium.sdum.uminho.pt/bitstream/1822/2878/1/2005-MCMP-vade-context_final.pdf>, May 2005, 10 pages. |
Kals, et al. “SecuBat: A Web Vulnerability Scanner,” WWW2006, Available at <http://www.seclab.tuwien.ac.at/papers/secubat.pdf>, May 2006, 10 pages. |
Karger, et al. “Haystack: A User Interfacefor Creating, Browsing, and Organizing Arbitrary Semistructured Informafion,” CHI2004 Demonstration, Apr. 24-29, 2004, Vienna, Austria, Apr. 24, 2004, pp. 777-778. |
De Keukelaere, et al. “Smash: Secure Component Model for Cross-Domain Mashups on Unmodified Browsers,” Proc. of the 17th Intl. Conf. on World Wide Web, Apr. 21-25, 2008, ACM Press, New York, NT, USA, Apr. 21, 2008, 13 pages. |
Miller, et al. “Caja: Safe Active Content in Sanitized JavaScript,” Draft Tech Report. Available at google-caja.googlecode.com/files/caja-spec-2008-01-15.pdf, Nov. 5, 2007, 26 pages. |
OA dated Nov. 24, 2010 for U.S. Appl. No. 11/183,329, 32 pages. |
OA dated Nov. 29, 2010 for U.S. Appl. No. 11/762,900, 26 pages. |
OA dated Nov. 30, 2009 for U.S. Appl. No. 11/426,174, 31 pages. |
OA dated Dec. 12, 2008 for U.S. Appl. No. 12/118,333, 27 pages. |
OA dated Dec. 23, 2010 for U.S. Appl. No. 10/606,089, 36 pages. |
OA dated Dec. 28, 2010 for U.S. Appl. No. 12/146,461, 31 pages. |
Oasis, Bindings and profiles for the Oasis Security Assertion Markup Language (SAML), Jan. 10, 2002. |
Oasis, Oasis Security Services Use Cases and Requirements, May 30, 2001. Retrieved from http://www.oasis-open. org/committees/security/docs/draft-sstc-saml-reqs-01.pdf, cited in Non-Final Office Action for U.S. Appl. No. 10/047,032, dated May 30, 2001, 29 pages. |
McLaren, et al. “Oasis SSTC SAML Protocols Schema Discussion,” Retrieved from http://www.oasis-open.org/committees/security/docs/draft-sstc-protocol-discussion-01.pdf. Cited in Non-final Office Action for U.S. Appl. No. 10/047,032, dated Jul. 28, 2001, 14 pages. |
Ollman. “HTML Code Injection and Cross-site Scripting,” Jan. 2003, http://www.technicalinfo.net/papers/CCS.html, accessed Jan. 18, 2006, (Jan. 2003), 20 pages. |
O'Malley, et al., “USC: A Universal Stub Compiler”, Computer Communication Review, vol. 24, pp. 295-306, (Oct. 1994). http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.47.7554&rep=rep1&type=pdf. Last accessed Mar. 2, 2011, 12 pages. |
Reis, et al. “Architectural Principles for Safe Web Programs,” Department of Computer Science and Engineering, University of Washington, 2007, 7 pages. |
Reis, et al. “Browsershield: Vulnerability-Driven Filtering of Dynamic HTML,” vol. 1, Issue 3, ACM Press New York, NY, USA, Sep. 2007, 14 pages. |
“Restriction Requirement,” U.S. Appl. No. 10/047,032, dated Mar. 20, 2006, 4 pages. |
Sandboxie: Overview. Retrieved from the internet on Aug. 17, 2005: http://www.sandboxie.com/, 3 pages. |
Scott, et al. Abstracting Application-Level Web Security. WWW2002, May 7-11, 2002, Honolulu, Hawaii, USA, 13 pages. |
Scott, et al. “Design Considerations for Cross Page Post Backs in asp.net 2.0,” http://odetocode.com/Articles/421.aspx, Jul. 24, 2005, 9 pages. |
Selkirk. “Using XML Security Mechanisms,” Jul. 2001, BT Technology Journal, vol. 19, No. 3, pp. 35-43. |
Selkirk. XML and security, Jul. 2001, BT Technology Journal, vol. 19, DOI: 10.1023/A:1011977913258, pp. 23-24. |
Sirer, et al. “An Access Control Language for Web Services.” In Proceedings of the ACM Symposium on Access Control Models and Technologies, pp. 23-30, ACM Press 2002. http://citeseer.ist.psu.edu/636721.html. Last accessed Mar. 2, 2011, 8 pages. |
Sliwa, “Microsoft Bolsters Internet Explorer Security” Network World Fusion, Jun. 9, 1997, www.nwfusion.com/archive/1997/97-06-09micr-a.html, 2 pages. |
SNELL. SAMS Teach Yourself the Internet in 24 Hours, Third Edition, Jun. 1999, accessed at http://proquest.safaribooksonline.com/0672315890/ch081ev1sec3.quadrature.- .quadrature. |
“Sun Java System Access Manager”. Retrieved from Internet Dec. 21, 2005, 3 pages. http://web.archive.org/web/20040620192557/wwws.sun.com/software/products/acess_mgr/. |
Wang, et al. “The Multi-Principal OS Construction of the Gazelle Web Browser,” Microsoft Research, White Paper, Feb. 2009, 16 pages. |
Wayback Machine, Security Attribute, Apr. 17, 2001, Microsoft, http://web.archive.org/web/20010417082017/http://msdn.microsoft.com/works-hop/author/dhtml/reference/properties/security.asp, 3 pages. |
Wheeler. Secure Programming for Linux and Unix Howto, version 2.966, 2002, pp. 1-143. |
Yoshihama, et al. “Security Model for the Client-Side Web Application Environments,” IBM Tokyo Research Laboratory, May 24, 2007, 2 pages. |
Zhang, et al. “An Agent-Based Framework for Cross-Domain Cooperation of Enterprise,” Computer Supported Cooperative Work in Design, 2004. http://ieeexplore.ieee.org/xpl/abs_free.jsp?arNumber=1349034, printed on Apr. 13, 2006, May 26, 2004, 1 page. |
Zviran, et al. “Towards Generating a Data Integrity Standard,” Data and Knowledge Engineering, vol. 32, Issue 3, Mar. 2000, 291-313. |
NOA dated Jun. 28, 2010 for U.S. Appl. No. 11/262,316, 9 pages. |
Jajodia, et al. A Unified Framework for Enforcing Multiple Access Control Policies. In Proceedings of the 1997 ACM SIGMOD International Conference on Management of Data (Tucson, Arizona, United States). http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.40.3323&rep=rep1&type=pdf. Last accessed Mar. 2, 2011, 12 pages. |
Murphy, et al. “Securing the Enterprise from Malware Threats,” Available at http://www.surfcontrol.com/uploadedfiles/general/white_papers/Malware_Whitepaper.pdf, 2004,14 pages. |
NOA dated Sep. 20, 2007 for U.S. Appl. No. 10/047,302, 12 pages. |
OA dated Sep. 25, 2009 for U.S. Appl. No. 12/118,333, 16 pages. |
OA dated Jan. 2, 2009 for U.S. Appl. No. 11/217,748, 19 pages. |
OA dated Jan. 4, 2007 for U.S. Appl. No. 10/606,089, 18 pages. |
OA dated Jan. 6, 2010 for U.S. Appl. No. 11/145,530, 38 pages. |
OA dated Jan. 14, 2011 for U.S. Appl. No. 12/118,333, 24 pages. |
OA dated Jan. 20, 2010 for U.S. Appl. No. 11/183,329, 29 pages. |
OA dated Feb. 3, 2010 for U.S. Appl. No. 11/262,316, 13 pages. |
OA dated Feb. 3, 2011 for U.S. Appl. No. 11/426,785, 16 pages. |
OA dated Feb. 7, 2011 for U.S. Appl. No. 12/147,620, 27 pages. |
OA dated Feb. 8, 2010 for U.S. Appl. No. 11/426,785, 22 pages. |
OA dated Feb. 14, 2011 for U.S. Appl. No. 11/217,748, 20 pages. |
OA dated Feb. 15, 2006 for U.S. Appl. No. 10/606,089, 16 pages. |
OA dated Feb. 17, 2011 for U.S. Appl. No. 10/606,089, 36 pages. |
OA dated Mar. 15, 2010 for U.S. Appl. No. 12/118,333, 17 pages. |
OA dated Mar. 18, 2008 for U.S. Appl. No. 11/426,174, 34 pages. |
OA dated Mar. 28, 2007 for U.S. Appl. No. 10/047,302, 23 pages. |
OA dated Apr. 11, 2005 for U.S. Appl. No. 10/047,302, 30 pages. |
OA dated Feb. 17, 2009 for U.S. Appl. No. 11/262,316, 14 pages. |
OA dated Apr. 21, 2009 for U.S. Appl. No. 11/183,329, 22 pages. |
OA dated May 12, 2009 for U.S. Appl. No. 11/426,174, 37 pages. |
OA dated May 21, 2009 for U.S. Appl. No. 12/118,333, 17 pages. |
OA dated May 26, 2010 for U.S. Appl. No. 11/145,530, 51 pages. |
OA dated May 27, 2010 for U.S. Appl. No. 11/426,174, 31 pages. |
OA dated May 29, 2007 for U.S. Appl. No. 10/606,089, 21 pages. |
OA dated Jun. 8, 2009 for U.S. Appl. No. 11/217,748, 20 pages. |
OA dated Jun. 15, 2010 for U.S. Appl. No. 11/183,329, 25 pages. |
OA dated Jun. 19, 2008 for U.S. Appl. No. 11/145,530, 41 pages. |
OA dated Jun. 28, 2010 for U.S. Appl. No. 11/262,316, 9 pages. |
OA dated Jul. 8, 2009 for U.S. Appl. No. 11/426,785, 21 pages. |
OA dated Jul. 17, 2009 for U.S. Appl. No. 11/145,530, 31 pages. |
OA dated Jul. 21, 2010 for U.S. Appl. No. 11/426,785, 31 pages. |
OA dated Jul. 21, 2010 for U.S. Appl. No. 11/805,088, 14 pages. |
OA dated Jul. 24, 2006 for U.S. Appl. No. 10/606,089, 19 pages. |
OA dated Jul. 29, 2009 for U.S. Appl. No. 11/183,329, 27 pages. |
OA dated Aug. 4, 2006 for U.S. Appl. No. 10/047,302, 24 pages. |
OA dated Aug. 4, 2010 for U.S. Appl. No. 11/217,748, 18 pages. |
OA dated Aug. 18, 2008 for U.S. Appl. No. 11/262,316, 16 pages. |
OA dated Aug. 19, 2009 for U.S. Appl. No. 11/262,316, 22 pages. |
OA dated Sep. 16, 2010 for U.S. Appl. No. 11/426,174, 34 pages. |
OA dated Sep. 21, 2010 for U.S. Appl. No, 11/805,088, 11 pages. |
OA dated Oct. 6, 2010 for U.S. Appl. No. 10/606,089, 24 pages. |
OA dated Oct. 27, 2010 for U.S. Appl. No. 11/145,530, 54 pages. |
OA dated Nov. 19, 2008 for U.S. Appl. No. 11/183,329, 18 pages. |
OA dated Nov. 24, 2008 for U.S. Appl. No. 11/426,174, 36 pages. |
OA dated Nov. 24, 2009 for U.S. Appl. No. 11/217,748, 18 pages. |
OA dated Mar. 9, 2011 for U.S. Appl. No. 11/145,530, 45 pages. |
OA dated Mar. 17, 2011 for U.S. Appl. No. 11/426,174, 28 pages. |
OA dated Jun. 27, 2011 for U.S. Appl. No. 11/426,785, 21 pages. |
OA dated May 12, 2011 for U.S. Appl. No. 12/016,654, 18 pages. |
OA dated Jun. 6, 2011 for U.S. Appl. No. 12/146,460, 14 pages. |
Raggett, HTML 4.01, Dec. 24, 1999, W3C. URL http://www.w3.org/TR/html401/present/frames.html. Last accessed May 30, 2011, 14 pages. |
Muffincharizard, “Having Download Problems (About Mobile Code)”, Retrieved Nov. 2, 2010 at <<http://forums.zenolabs.com/showthread.php?t=39390>>, Jan. 27, 2005, 2 pages. |
“eSafe Technologies Launches at Internet Showcase; New anti-vandal software provides ‘Next Generation’ PC Protection”, Retrieved Mar. 26, 2014 at <<http://www.thefreelibrary.com/_/print/PrintArticle.aspx?id=19356849>>, eSafe Technologies, Apr. 28, 1997, 4 pages. |
U.S. Appl. No. 61/058,213, entitled “Online Ad Serving,” inventors Fan et al., filed Jun. 3, 2008, 33 pages. |
U.S. Appl. No. 61/058,214, entitled “User Interface for Online Ads,” inventors Fan et al., filed Jun. 3, 2008, 32 pages. |
Vuong, et al., “Managing Security Policies in a Distributed Environment Using eXtensible Markup Language (XML),” Retrieved at <<http://users.cis.fiu.edu/˜smithg/papers/sac01.pdf.2001>>, ACM Symposium on Applied Computing (SAC), 2001, 7 pages. |
Chinese Office Action for “Running Internet Applications with Low Rights,” Chinese Application No. 200680019185.4, Office Action dated Aug. 4, 2010, 13 pages. |
Hamilton, Marc, “Java and the Shift to Net-centric Computing”, IEEE Computer, vol. 29, Issue 8, Aug. 1996, pp. 31-39. |
“Intense Internet Security Pro 2005”, Retrieved on Aug. 17, 2005 at <<http://www.intenseintegrations.com/catalog/iis.php>>. |
“Block JavaScript, VBScript, and/or Embedded Objects—ZoneAlarm Pro,” Retrieved Nov. 2, 2010 at <<http://malektips.com/zonealarm_pro_0008.html>>, MalekTips, 1 page. |
Dhamija, et al., “The Battle Against Phishing: Dynamic Security Skins,” Retrieved at <<http://www.cs.berkeley.edu/˜tygar/papers/Phishing/Battle_against_phishing.pdf>>, In Proceedings of the 2005 ACM Symposium on Usable Security and Privacy (SOUPS), Jul. 2005, pp. 77-88. |
“Enough is Enough!”, Retrieved Aug. 17, 2005 at <<https://netfiles.uiuc.edu/ehowes/www/resource6.htm>>, 3 pages. |
“International Search Report”, dated Jul. 27, 2007, Application No. PCT/US2006/26861, entitled “Immunizing HTML Browsers and Extensions from Known Vulnerabilities,” Filed Date: Jul. 10, 2006, 2 pages. |
Jackson, et al., “Subspace: Secure Cross-Domain Communication for Web Mashups”, Retrieved at <<http://www.collinjackson.com/research/papers/fp801-jackson.pdf>>, in Proceedings of the 2007 International Conference on the World Wide Web (WWW), May 8-12, 2007, 10 pages. |
Wei, et al., “The design of a stub generator for heterogeneous RPC Systems”, Journal of Parallel and Distributed Computing, vol. 11, pp. 188-197, Mar. 1991. https://www.sciencedirect.com/science/article/pii/0743731591900439. |
SpywareBlaster 3.4, http://www.javacoolsoftware.com/spyblaster.html, last accessed Mar. 2, 2011, 1 page. |
SpywareGuard 2.2, retrieved from the Internet on Aug. 17, 2005: http://javacoolsoftware.com/spywareguard.html, 2 pages. |
“Sun Java System Access Manager”. Retrieved from internet Dec. 21, 2005, 3 pages. http://web.archive.org/web/20040620192557/wwws.sun.com/software/products/acess_mgr/. |
Thorpe. “Secure Cross-Domain Communication in the Browser,” Available at http://msdn.microsoft.com/en-us/library/bb735305(printer).aspx, 2008, 6 pages. |
“U.S. Appl. No. 61/058,213” dated Jun. 3, 2008, 33 pages. |
“U.S. Appl. No. 61/058,214” dated Jun. 3, 2008, 32 pages. |
“Virtual Sandbox 2.0” Retrieved from <http://www.fortresgrand.com/products/vsb/vsb.htm>, on Jan. 25, 2008, 3 pages. |
Wahbe, et al. “Efficient Software-Based Fault Isolation,” 1993 ACM SIGOPS, Dec. 5-8, 1993, 14 pages. |
OA dated Jul. 21, 2010 for U.S. Appl. No. 12/118,333, 14 pages. |
Wang, et al. “Shield: Vulnerability Driven Network Filters for Preventing Known Vulnerability Exploits,” SIGCOMM '04, Aug. 30-Sep. 3, 2004, Portland, OR. Available at http://delivery.acm.org/10.1145/1 020000/1 015489/p193-wang.pdf?key1=1015489&key2=8156443411 &coll=GUIDE&dl=GUIDE&CFID=72316072&CFTOKEN=46175408, Aug. 30, 2004, pp. 193-204. |
Number | Date | Country | |
---|---|---|---|
20080313648 A1 | Dec 2008 | US |