To achieve fast development times, high level scripting languages have become the main choice of developers. Among these, JavaScript is the most popular choice in the context of full-stack web applications. Researches prior to this work were mainly focused on vulnerabilities introduced by the language itself and not on its interactions with dependencies written in low-level languages. This work explores how it is possible to restrict the privileges given to such components when employed by JavaScript runtimes and WASM runtimes that are WASI compliant. Finally, this research proposes techniques to strengthen the privacy and confidentiality requirements of data collections included in the security boundaries guaranteed by the above mentioned researches.
(2025). Enforcing Security Boundaries and Protecting Application Data . Retrieved from https://hdl.handle.net/10446/307911 Retrieved from http://dx.doi.org/10.13122/978-88-97253-23-5
Enforcing Security Boundaries and Protecting Application Data
Oldani, Gianluca
2025-09-01
Abstract
To achieve fast development times, high level scripting languages have become the main choice of developers. Among these, JavaScript is the most popular choice in the context of full-stack web applications. Researches prior to this work were mainly focused on vulnerabilities introduced by the language itself and not on its interactions with dependencies written in low-level languages. This work explores how it is possible to restrict the privileges given to such components when employed by JavaScript runtimes and WASM runtimes that are WASI compliant. Finally, this research proposes techniques to strengthen the privacy and confidentiality requirements of data collections included in the security boundaries guaranteed by the above mentioned researches.| File | Dimensione del file | Formato | |
|---|---|---|---|
|
CollanaSAFD_Volume81_2025.pdf
accesso aperto
Versione:
publisher's version - versione editoriale
Licenza:
Creative commons
Dimensione del file
3.07 MB
Formato
Adobe PDF
|
3.07 MB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
Aisberg ©2008 Servizi bibliotecari, Università degli studi di Bergamo | Terms of use/Condizioni di utilizzo

