SEngine/JavaScript
To protect web users from JavaScript injection we experimented with the JavaScript
engine of Firefox in order to protect users from JavaScript injection.
Firefox uses a JavaScript engine called
SpiderMonkey. SpiderMonkey is implemented in C and it is also the JavaScript engine
for Yahoo! Widgets, UOX3 and others.
To generate legitimate signatures when the eval
function is called we obtain the complete path of the file that
called the eval function (with the website's URL
included), the line of the file where eval was called, and the
JavaScript stack trace.
The source code is currently being polished. For any questions please contact the
Author