@conference { masci06, title = {Detecting data leakage in malicious Java applets}, booktitle = {ReSIST Student Seminar}, year = {2006}, pages = {81{\textendash}84}, abstract = {

Web applets are programs dynamically loaded and executed inside the Internet browser of users{\textquoteright} machine. They are used to extend the functionalities of web pages. Web applets can be associated with specific profiles granting access to information of users. As a consequence, web applets may possibly disclose, intentionally or by error, confidential information on public channels. We propose a technique to analyze the compiled code of web applets before execution. The technique is based on abstract interpretation. Data is associated with security levels and an iterative analysis is performed to trace information flows.

}, author = {Paolo Masci} }