Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Phu H. Phung is active.

Publication


Featured researches published by Phu H. Phung.


computer and communications security | 2009

Lightweight self-protecting JavaScript

Phu H. Phung; David Sands; Andrey Chudnov

This paper introduces a method to control JavaScript execution. The aim is to prevent or modify inappropriate behaviour caused by e.g. malicious injected scripts or poorly designed third-party code. The approach is based on modifying the code so as to make it self-protecting: the protection mechanism (security policy) is embedded into the code itself and intercepts security relevant API calls. The challenges come from the nature of the JavaScript language: any variables in the scope of the program can be redefined, and code can be created and run on-the-fly. This creates potential problems, respectively, for tamper-proofing the protection mechanism, and for ensuring that no security relevant events bypass the protection. Unlike previous approaches to instrument and monitor JavaScript to enforce or adjust behaviour, the solution we propose is lightweight in that (i) it does not require a modified browser, and (ii) it does not require any run-time parsing and transformation of code (including dynamically generated code). As a result, the method has low run-time overhead compared to other methods satisfying (i), and the lack of need for browser modifications means that the policy can even be applied on the server to mitigate some effects of cross-site scripting bugs.


annual computer security applications conference | 2012

JSand: complete client-side sandboxing of third-party JavaScript without browser modifications

Pieter Agten; Steven Van Acker; Yoran Brondsema; Phu H. Phung; Lieven Desmet; Frank Piessens

The inclusion of third-party scripts in web pages is a common practice. A recent study has shown that more than half of the Alexa top 10000 sites include scripts from more than 5 different origins. However, such script inclusions carry risks, as the included scripts operate with the privileges of the including website. We propose JSand, a server-driven but client-side JavaScript sandboxing framework. JSand requires no browser modifications: the sandboxing framework is implemented in JavaScript and is delivered to the browser by the websites that use it. Enforcement is done entirely at the client side: JSand enforces a server-specified policy on included scripts without requiring server-side filtering or rewriting of scripts. Most importantly, JSand is complete: access to all resources is mediated by the sandbox. We describe the design and implementation of JSand, and we show that it is secure, backwards compatible, and that it performs sufficiently well.


computer software and applications conference | 2008

Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented Programming

Phu H. Phung; David Sands

The lifecycle mismatch between vehicles and their IT system poses a problem for the automotive industry. Such systems need to be open and extensible to provide customised functionalities and services. What is less clear is how to achieve this with quality and security guarantees. Recent studies in language-based security - the use of programming language technology to enforce application specific security policies - show that security policy enforcement mechanisms such as Mined reference monitors provide a potential solution for security in extensible systems. In this paper we study the implementation of security policy enforcement using aspect-oriented programming for the OSGi (Open Services Gateway initiative) framework. We identify classes of reference monitor-style policies that can be defined and enforced using AspectJ, a well-known aspect-oriented programming language. We demonstrate the use of security states to describe history-based policies. We also introduce and implement various levels of security states in Java to describe session level history versus global application level history. We illustrate the effectiveness of the implementation by deploying the security policy enforcement solution in an example scenario of software downloading in a standard vehicle system.


Proceedings of the Workshop on JavaScript Tools | 2012

A two-tier sandbox architecture for untrusted JavaScript

Phu H. Phung; Lieven Desmet

The large majority of websites nowadays embeds third-party JavaScript into their pages, coming from external partners. Ideally, these scripts are benign and come from trusted sources, but over time, these third-party scripts can start to misbehave, or to come under control of an attacker. Unfortunately, the state-of-practice integration techniques for third-party scripts do not impose restrictions on the execution of JavaScript code, allowing such an attacker to perform unwanted actions on behalf of the website owner and/or website visitor. In this paper, we present a two-tier sandbox architecture to enable a website owner to enforce modular fine-grained security policies for potential untrusted third-party JavaScript code. The architecture contains an outer sandbox that provides strong baseline isolation guarantees with generic, coarse-grained policies and an inner sandbox that enables fine-grained, stateful policy enforcement specific to a particular untrusted application. The two-tier approach ensures that the application-specific policies and untrusted code are by default confined to a basic security policy, without imposing restrictions on the expressiveness of the policies. Our proposed architecture improves upon the state-of-the-art as it does not depend on browser modification nor preprocessing or transformation of untrusted code, and allows the secure enforcement of fine-grained, stateful access control policies. We have developed a prototype implementation on top of a open-source sandbox library in the ECMAScript 5 specification, and applied it to a representative online advertisement case study to validate the feasibility and security of the proposed architecture.


IEEE Transactions on Dependable and Secure Computing | 2015

Between Worlds: Securing Mixed JavaScript/ActionScript Multi-Party Web Content

Phu H. Phung; Maliheh Monshizadeh; Meera Sridhar; Kevin W. Hamlen; V. N. Venkatakrishnan

Mixed Flash and JavaScript content has become increasingly prevalent; its purveyance of dynamic features unique to each platform has popularized it for myriad Web development projects. Although Flash and JavaScript security has been examined extensively, the security of untrusted content that combines both has received considerably less attention. This article considers this fusion in detail, outlining several practical scenarios that threaten the security of Web applications. The severity of these attacks warrants the development of new techniques that address the security of Flash-JavaScript content considered as a whole, in contrast to prior solutions that have examined Flash or JavaScript security individually. Toward this end, the article presents FlashJaX, a cross-platform solution that enforces fine-grained, history-based policies that span both Flash and JavaScript. Using in-lined reference monitoring, FlashJaX safely embeds untrusted JavaScript and Flash content in Web pages without modifying browser clients or using special plug-ins. The architecture of FlashJaX, its design and implementation, and a detailed security analysis are exposited. Experiments with advertisements from popular ad networks demonstrate that FlashJaX is transparent to policy-compliant advertisement content, yet blocks many common attack vectors that exploit the fusion of these Web platforms.


nordic conference on secure it systems | 2013

SafeScript: JavaScript Transformation for Policy Enforcement

Mike Ter Louw; Phu H. Phung; Rohini Krishnamurti; V. N. Venkatakrishnan

Approaches for safe execution of JavaScript on web pages have been a topic of recent research interest. A significant number of these approaches aim to provide safety through runtime mediation of accesses made by a JavaScript program. In this paper, we propose a novel, lightweight JavaScript transformation technique for enforcing security properties on untrusted JavaScript programs using source code interposition. Our approach assures namespace isolation between several principals within a single web page, and access control for sensitive browser interfaces. This access control mechanism is based on a whitelist approach to ensure soundness of the mediation. Our technique is lightweight, resulting in low run-time overhead compared to existing solutions such as BrowserShield and Caja.


the internet of things | 2017

P4SINC - An Execution Policy Framework for IoT Services in the Edge

Phu H. Phung; Hong Linh Truong; Divya Teja Yasoju

Internet of Things (IoT) services are increasingly deployed at the edge to access and control Things. The execution of such services needs to be monitored to provide information for security, service contract, and system operation management. Although different techniques have been proposed for deploying and executing IoT services in IoT gateways and edge servers, there is a lack of generic policy frameworks for instrumentation and assurance of various types of execution policies for IoT services. In this paper, we present P4SINC as an execution policy framework that covers various functionalities for IoT services deployed in software-defined machines in IoT infrastructures. P4SINC supports the instrumentation and enforcement of IoT services during their deployment and execution, thus being leveraged for other purposes such as security and service contract management. We illustrate our prototype with realistic examples.


Procedia Computer Science | 2012

Governing Bot-as-a-Service in Sustainability Platforms - Issues and Approaches

Hong Linh Truong; Phu H. Phung; Schahram Dustdar

The emerging cloud computing models for Internet-of-Things have fostered the development of lightweight applications using cloud services for monitoring and optimizing devices and equipment hosted in distributed facilities. Such applications – called bots in our work – can be composed and deployed with multiple types of governance policies from cloud platforms to distributed hosting environments and they can access not only local data and devices but also cloud data and features. Therefore, it is a great challenge to govern them. In this paper, we discuss governance issues and state-of-the-art on supporting the emerging Bot-as-a-Service in sustainability governance platforms. Based on that we outline our approaches to policy development and enforcement for the Bot-as-a-Service model


nordic conference on secure it systems | 2010

Safe wrappers and sane policies for self protecting javascript

Jonas Magazinius; Phu H. Phung; David Sands


IET Road Transport Information and Control Conference and the ITS United Kingdom Members' Conference (RTIC 2008) | 2008

Vehicle ECU classification based on safety-security characteristics

Dennis K. Nilsson; Phu H. Phung; Ulf E. Larson

Collaboration


Dive into the Phu H. Phung's collaboration.

Top Co-Authors

Avatar

David Sands

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Lieven Desmet

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

V. N. Venkatakrishnan

University of Illinois at Chicago

View shared research outputs
Top Co-Authors

Avatar

Dennis K. Nilsson

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Frank Piessens

National Fund for Scientific Research

View shared research outputs
Top Co-Authors

Avatar

Steven Van Acker

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Meera Sridhar

University of Texas at Dallas

View shared research outputs
Top Co-Authors

Avatar

Hong Linh Truong

Vienna University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jonas Magazinius

Chalmers University of Technology

View shared research outputs
Top Co-Authors

Avatar

Ulf E. Larson

Chalmers University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge