To achieve fast development times, high level scripting languages have become the main choice of developers. Among these, JavaScript is the most popular choice in the context of full-stack web applications. Researches prior to this work were mainly focused on vulnerabilities introduced by the language itself and not on its interactions with dependencies written in low-level languages. This work explores how it is possible to restrict the privileges given to such components when employed by JavaScript runtimes and WASM runtimes that are WASI compliant. Finally, this research proposes techniques to strengthen the privacy and confidentiality requirements of data collections included in the security boundaries guaranteed by the above mentioned researches.

(2025). Enforcing Security Boundaries and Protecting Application Data . Retrieved from https://hdl.handle.net/10446/307911 Retrieved from http://dx.doi.org/10.13122/978-88-97253-23-5

Enforcing Security Boundaries and Protecting Application Data

Oldani, Gianluca
2025-09-01

Abstract

To achieve fast development times, high level scripting languages have become the main choice of developers. Among these, JavaScript is the most popular choice in the context of full-stack web applications. Researches prior to this work were mainly focused on vulnerabilities introduced by the language itself and not on its interactions with dependencies written in low-level languages. This work explores how it is possible to restrict the privileges given to such components when employed by JavaScript runtimes and WASM runtimes that are WASI compliant. Finally, this research proposes techniques to strengthen the privacy and confidentiality requirements of data collections included in the security boundaries guaranteed by the above mentioned researches.
scientifica
Inglese
set-2025
978-88-97253-23-5
online
126
81
Italy
Bergamo
Università degli Studi di Bergamo
Settore IINF-05/A - Sistemi di elaborazione delle informazioni
data collection; data sanitization; data storage and processing; k-anonymity; l-diversity; Mondrian; data indexing; Software and application security; Linux Security Modules; eBPF; JavaScript; WASM; Softwarе Fault Isolation
276
(2025). Enforcing Security Boundaries and Protecting Application Data . Retrieved from https://hdl.handle.net/10446/307911 Retrieved from http://dx.doi.org/10.13122/978-88-97253-23-5
open
1
info:eu-repo/semantics/book
1.9 Tesi di dottorato - Unibg doctoral theses::1.9.03 Collana della Scuola di Alta Formazione Dottorale
Non definito
Oldani, Gianluca
File allegato/i alla scheda:
File Dimensione del file Formato  
CollanaSAFD_Volume81_2025.pdf

accesso aperto

Versione: publisher's version - versione editoriale
Licenza: Creative commons
Dimensione del file 3.07 MB
Formato Adobe PDF
3.07 MB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

Aisberg ©2008 Servizi bibliotecari, Università degli studi di Bergamo | Terms of use/Condizioni di utilizzo

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10446/307911
Citazioni
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact