SEngine/JavaScript

preventing JavaScript injection attacks with a secure JS engine

SEngine/JavaScript

To protect web users from JavaScript injection we experimented with the JavaScript engine of Firefox in order to protect users from JavaScript injection. Firefox uses a JavaScript engine called SpiderMonkey. SpiderMonkey is implemented in C and it is also the JavaScript engine for Yahoo! Widgets, UOX3 and others. To generate legitimate signatures when the eval function is called we obtain the complete path of the file that called the eval function (with the website's URL included), the line of the file where eval was called, and the JavaScript stack trace. The source code is currently being polished. For any questions please contact the Author