On the Integrity of Cross-Origin JavaScripts

09/15/2018
by   Jukka Ruohonen, et al.
0

The same-origin policy is a fundamental part of the Web. Despite the restrictions imposed by the policy, embedding of third-party JavaScript code is allowed and commonly used. Nothing is guaranteed about the integrity of such code. To tackle this deficiency, solutions such as the subresource integrity standard have been recently introduced. Given this background, this paper presents the first empirical study on the temporal integrity of cross-origin JavaScript code. According to the empirical results based on a ten day polling period of over 35 thousand scripts collected from popular websites, (i) temporal integrity changes are relatively common; (ii) the adoption of the subresource integrity standard is still in its infancy; and (iii) it is possible to statistically predict whether a temporal integrity change is likely to occur. With these results and the accompanying discussion, the paper contributes to the ongoing attempts to better understand security and privacy in the current Web.

READ FULL TEXT
research
08/22/2018

Invisible Pixels Are Dead, Long Live Invisible Pixels!

Privacy has deteriorated in the world wide web ever since the 1990s. The...
research
01/15/2019

Analysis of a site's integrity by 3D models and Integrated database, case study : the pic-du-midi high-mountain observatory (France)

The concept of "integrity", as currently used in the analysis of World H...
research
06/25/2021

Crossing Cross-Domain Paths in the Current Web

The loading of resources from third-parties has evoked new security and ...
research
06/17/2021

Hardware-Enforced Integrity and Provenance for Distributed Code Deployments

Deployed microservices must adhere to a multitude of application-level s...
research
02/28/2022

SFIP: Coarse-Grained Syscall-Flow-Integrity Protection in Modern Systems

Growing code bases of modern applications have led to a steady increase ...
research
04/02/2020

CORSICA: Cross-Origin Web Service Identification

Vulnerabilities in private networks are difficult to detect for attacker...
research
10/16/2017

How PHP Releases Are Adopted in the Wild?

This empirical paper examines the adoption of PHP releases in the the co...

Please sign up or login with your details

Forgot password? Click here to reset