Neha Narula’s research while affiliated with Massachusetts Institute of Technology and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (1)


Privacy-preserving browser-side scripting with BFlow
  • Conference Paper

April 2009

·

43 Reads

·

44 Citations

Alexander Yip

·

Neha Narula

·

Maxwell N. Krohn

·

Robert Morris

Some web sites provideinteractiveextensionsusing browser scripts,oftenwithoutinspectingthescriptstoverifythatthey are benign and bug-free. Others handle users' confidential data and display it via the browser. Such new features con- tribute to the power of online services, but their combination would allow attackers to steal confidential data. This paper presents BFlow, a security system that uses informationflow control to allowthe combinationwhilepreventingattackson data confidentiality. BFlow allows untrusted JavaScript to compute with, ren- der, and store confidential data, while preventing leaks of that data. BFlow tracks confidential data as it flows within the browser, between scripts on a page and between scripts and web servers. Using these observations and assistance from participating web servers, BFlow prevents scripts that have seen confidential data from leaking it, all without dis- rupting the JavaScript communication techniques used in complexweb pages. To achieve these ends, BFlow augments browsers with a new "protection zone" abstraction. We have implemented a BFlow browser reference mon- itor and server support. To evaluate BFlow's confidentiality protection and flexibility, we have built a BFlow-protected blog that supports Blogger's third party JavaScript exten- sions. BFlow is compatible with every legitimate Blogger extension that we have found, yet it prevents malicious ex- tensions from leaking confidential data.

Citations (1)


... Aeolus and other recent systems enable decentralized information flow control by allowing modules to own different data categories. While various systems have incorporated information monitoring through techniques such as processor micro-architectures [4,29], virtualization methods [3,10], and web-browser support [2,31,32,35]. We will mainly focus our discussion on the two research directions that are most closely linked to Aeolus: the programming language researches and operating system work. ...

Reference:

Formalization and Analysis of Aeolus-based File System from Process Algebra Perspective
Privacy-preserving browser-side scripting with BFlow
  • Citing Conference Paper
  • April 2009