Research


ExpoSE: Practical Symbolic Execution Of Standalone JavaScript

JavaScript has evolved into a versatile ecosystem for not just the web, but also a wide range of server-side and client-side applications. With this increased scope, the potential impact of bugs increases. Despite this, testing tools for JavaScript have remained relatively primitive, largely due to the languages complex implementation and confusing specification. ExpoSE is a dynamic symbolic execution (DSE) tool for JavaScript with support for asynchronous events, strings, and complex regular expressions (including capture groups). It also supports concurrent test-case execution and provides detailed coverage statistics. More info
Tags: Papers, Research, Projects Created on: 09-08-2018

Detecting Humanity - Brave Software

During a research internship at Brave Software in 2018 I worked on verifiable client side humanity detection tools. This work is a deployment of anomaly detection to identify client humanity through runtime behaviour. Humanity detection is an issue in software development, where automation tools have forced deployment of obtrusive countermeasures (e.g. CAPTCHA). The biggest concerns raised by this approach are privacy and verifiability, as the proof of humanity is on client side but must be verifiable by a third party (Brave) without exposing private user data. More info
Tags: Research, Work Created on: 09-08-2018

A Solution To Compression Oracles on the Web - Cloudflare

Compression is often considered an essential tool when reducing the bandwidth usage of internet services. The impact that the use of such compression schemes can have on security, however, has often been overlooked. The recently detailed CRIME, BREACH, TIME and HEIST attacks on TLS have shown that if an attacker can make requests on behalf of a user then secret information can be extracted from encrypted messages using only the length of the response. Deciding whether an element of a web-page should be secret often depends on the content of the page, however there are some common elements of web-pages which should always remain secret such as Cross-Site Request Forgery (CSRF) tokens. Such tokens are used to ensure that malicious webpages cannot forge requests from a user by enforcing that any request must contain a secret token included in a previous response. More info
Tags: Research, Work Created on: 09-08-2018