Managing Access to Security Hardware in PC Browsers
نویسندگان
چکیده
Web applications that require higher levels of security have various security options that can be deployed on the server. However providing security on the client consuming the service remains a challenge especially when the application runs in a web browser. While various types of security hardware can work with the user's computer, there is no convenient way for web applications to access such hardware from the web browser. To fill this gap, we develop a software tool called SEAM, which is a SEcure Add-on Management framework built on top of the web browser native extension framework. Through SEAM, web applications can access secure hardware in a controlled manner. SEAM was devised with usability and security at the core. It is flexible and convenient to use, easy to deploy, and works across major PC platforms and web browsers. This paper describes the rationale and design of SEAM, and illustrates its applications.
منابع مشابه
On the Disparity of Display Security in Mobile and Traditional Web Browsers
Mobile web browsers now provide nearly equivalent features when compared to their desktop counterparts. However, smaller screen size and optimized features for constrained hardware make the web experience on mobile browsers significantly different. In this paper, we present the first comprehensive study of the display-related security issues in mobile browsers. We identify two new classes of di...
متن کاملTrust and Protection in the Illinois Browser Operating System
Current web browsers are complex, have enormous trusted computing bases, and provide attackers with easy access to modern computer systems. In this paper we introduce the Illinois Browser Operating System (IBOS), a new operating system and a new browser that reduces the trusted computing base for web browsers. In our architecture we expose browser-level abstractions at the lowest software layer...
متن کاملSecurity-aware register placement to hinder malicious hardware updating and improve Trojan detectability
Nowadays, bulk of the designers prefer to outsource some parts of their design and fabrication process to the third-part companies due to the reliability problems, manufacturing cost and time-to-market limitations. In this situation, there are a lot of opportunities for malicious alterations by the off-shore companies. In this paper, we proposed a new placement algorithm that hinders the hardwa...
متن کاملFighting Crimeware: An Architecture for Split-Trust Web Applications
We present an architecture for split-trust browsing: a technique that enables web applications to split their HTML across a pair of browsers—one untrusted browser running on a PC and one trusted browser running on a user’s personal device. Information entered via the personal device’s keypad cannot be read by the PC, thwarting PC-based keyloggers. Similarly, information displayed on the persona...
متن کاملC0PE: Consistent 0-Administration Personal Environment
The C0PE project explores system issues that arise when an individual’s computing environment is spread across dozens of information devices. The goals are (i) to provide a consistent view of each individual’s personal information space, (ii) to drive the incremental cost of adding, maintaining, and using additional devices near zero, and (iii) to provide a highly trustworthy environment. Becau...
متن کامل