Interface Module for Emulator-Based Web Application Execution Engine

  • Hyunwoo Nam
  • Neungsoo ParkEmail author
Part of the Studies in Computational Intelligence book series (SCI, volume 789)


The source code of a web application executed on the web browser has been exposed to leakage, and it is difficult to implement various web functions compared with other general applications. Therefore, in practical web applications, web plug-in technologies are used. However, web plug-in technology has a platform dependency and is attacked by malicious codes which resulting in a damage of the system. On the other hands, the web-based emulator is independent of platforms as well as web browsers. Recently, various web emulators were introduced, and users can use it as the virtual machine environment of diverse platforms on the web browser. However, these web-based emulator doesn’t provide an interface API to access other web application. In this paper, we propose the modified web-based emulator with the interface module and API, called as the web emulator-based execution engine. Using the proposed system, a native code in a web application is easily written by C, and C++ and compiled. Furthermore it can be distributed and executed directly on the emulator-based web application execution engine. Therefore it solves the leak problem of source codes that is the vulnerability of web applications. The proposed emulator-based web application execution engine is a new concept combined web plug-in and emulator. In the experiment we developed an interface module and an API for the proposed emulator-based web application execution engine. The experimental emulator-based web application was implemented and tested to evaluate the overall system.


Web application Obfuscation Emulator JavaScript Native binary 


  1. 1.
    Malzilla. Available: http://
  2. 2.
    K-Apps: Method for providing encrypted web application, terminal supporting the same, and recording medium thereof. KR Patent 1014723460000, 2014Google Scholar
  3. 3.
  4. 4.
  5. 5.
    Zakai, A.: Emscripten: an LLVM-to-JavaScript compiler. In: Proceedings of the ACM International Conference Companion on Object Oriented Programming Systems Languages and Applications Companion, pp. 301–312Google Scholar
  6. 6.
    Dynamic loading library. Available:
  7. 7.
  8. 8.
    Kurumatani, S., Kasae, Y., Toyama, M., Akama H.: Hosting a server on a browser using Wemu architecture. In: Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services, pp. 159–162 (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Dept of Computer Science and EngineeringKonkuk UniversitySeoulKorea

Personalised recommendations