To achieve fast development times, high level scripting languages have become the main choice of developers. Among these, JavaScript is the most popular choice in the context of full-stack web applications. Researches prior to this work were mainly focused on vulnerabilities introduced by the language itself and not on its interactions with dependencies written in low-level languages. This work explores how it is possible to restrict the privileges given to such components when employed by JavaScript runtimes and WASM runtimes that are WASI compliant. Finally, this research proposes techniques to strengthen the privacy and confidentiality requirements of data collections included in the security boundaries guaranteed by the above mentioned researches.

(2025). Enforcing Security Boundaries and Protecting Application Data . Retrieved from https://hdl.handle.net/10446/307911 Retrieved from http://dx.doi.org/10.13122/978-88-97253-23-5

Enforcing Security Boundaries and Protecting Application Data

Oldani, Gianluca
2025-09-01

Abstract

To achieve fast development times, high level scripting languages have become the main choice of developers. Among these, JavaScript is the most popular choice in the context of full-stack web applications. Researches prior to this work were mainly focused on vulnerabilities introduced by the language itself and not on its interactions with dependencies written in low-level languages. This work explores how it is possible to restrict the privileges given to such components when employed by JavaScript runtimes and WASM runtimes that are WASI compliant. Finally, this research proposes techniques to strengthen the privacy and confidentiality requirements of data collections included in the security boundaries guaranteed by the above mentioned researches.
set-2025
Oldani, Gianluca
File allegato/i alla scheda:
File Dimensione del file Formato  
CollanaSAFD_Volume81_2025.pdf

accesso aperto

Versione: publisher's version - versione editoriale
Licenza: Creative commons
Dimensione del file 3.07 MB
Formato Adobe PDF
3.07 MB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

Aisberg ©2008 Servizi bibliotecari, Università degli studi di Bergamo | Terms of use/Condizioni di utilizzo

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10446/307911
Citazioni
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact