JSSignature: eliminating third-party-hosted JavaScript infection threats using digital signatures

Kousha Nakhaei,Fateme Ansari,Ebrahim Ansari
DOI: https://doi.org/10.1007/s42452-019-1805-5
2019-12-02
SN Applied Sciences
Abstract:Today, third-party JavaScript resources are an indispensable part of the web platform. More than 88% of the world's top websites include at least one JavaScript resource from a remote host. However, there is a great security risk behind using a third-party JavaScript resource, if an attacker can infect one of these remote JavaScript resources all websites those have included the script would be at risk. In this paper, we present JSSignature, an entirely at the client-side pure JavaScript framework in order to validate third-party JavaScript resources using a digital signature. Therefore, all included JavaScript resources are checked against the integrity, authentication and non-repudiation risks before the execution. In contrary to existing methods, JSSignature protects web pages regardless of third-party resource infection nature while it does not set any restrictions on trusted JavaScript providers. This approach has an acceptable one-time performance overhead and is an easily deployable add-in. We have validated the proposed solution by applying tests on an implemented version (<span class="ExternalRef"><a href="https://iasbs.ac.ir/%7eansari/jssignature/demo.html"><span class="RefSource">https://iasbs.ac.ir/~ansari/jssignature/demo.html</span></a></span>). A pre-published version of this paper is available at arXiv website (<span class="ExternalRef"><a href="https://arxiv.org/pdf/1812.03939.pdf"><span class="RefSource">https://arxiv.org/pdf/1812.03939.pdf</span></a></span>).
What problem does this paper attempt to address?