skip to main content
10.1145/2046707.2046777acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Fortifying web-based applications automatically

Published:17 October 2011Publication History

ABSTRACT

Browser designers create security mechanisms to help web developers protect web applications, but web developers are usually slow to use these features in web-based applications (web apps). In this paper we introduce Zan, a browser-based system for applying new browser security mechanisms to legacy web apps automatically. Our key insight is that web apps often contain enough information, via web developer source-code patterns or key properties of web-app objects, to allow the browser to infer opportunities for applying new security mechanisms to existing web apps. We apply this new concept to protect authentication cookies, prevent web apps from being framed unwittingly, and perform JavaScript object deserialization safely. We evaluate Zan on up to the 1000 most popular websites for each of the three cases. We find that Zan can provide complimentary protection for the majority of potentially applicable websites automatically without requiring additional code from the web developers and with negligible incompatibility impact.

References

  1. JSON in JavaScript. http://www.json.org/js.html.Google ScholarGoogle Scholar
  2. Mitigating cross-site scripting with HTTP-only cookies. http://msdn.microsoft.com/en-us/library/ms533046.aspx.Google ScholarGoogle Scholar
  3. Qt - A Cross-platform application and UI. http://qt.nokia.com/.Google ScholarGoogle Scholar
  4. Symantec internet security threat report april 2010. http://www.symantec.com/business/theme.jsp?themeid=threatreport.Google ScholarGoogle Scholar
  5. The WebKit Open Source Project. http://webkit.org/.Google ScholarGoogle Scholar
  6. Alexa. Alexa top 500 global sites. http://www.alexa.com/topsites.Google ScholarGoogle Scholar
  7. M. Balduzzi, M. Egele, E. Kirda, D. Balzarotti, and C. Kruegel. A solution for the automated detection of clickjacking attacks. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pages 135--144, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. R. Barnett. Helping protect cookies with httponly flag. http://blog.modsecurity.org/2008/12/helping-protect-cookies-with-httpon%ly-flag.html, 2008.Google ScholarGoogle Scholar
  9. A. Barth, C. Jackson, and J. C. Mitchell. Robust defenses for cross-site request forgery. In Proceedings of the 15th ACM Conference on Computer and Communications Security, pages 75--88, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Barth, C. Jackson, C. Reis, and The Google Chrome Team. The security architecture of the chromium browser, 2008. http://crypto.stanford.edu/websec/chromium/chromium-security-architectu%re.pdf.Google ScholarGoogle Scholar
  11. BBC. Facebook "clickjacking" spreads across site, June 2010. http://www.bbc.co.uk/news/10224434.Google ScholarGoogle Scholar
  12. Google Inc. Chromium. http://www.chromium.org/chromium-os.Google ScholarGoogle Scholar
  13. Google Inc. Google Caja. http://code.google.com/p/google-caja/.Google ScholarGoogle Scholar
  14. C. Grier, S. Tang, and S. T. King. Secure web browsing with the OP web browser. In Proceedings of the 2008 IEEE Symposium on Security and Privacy, pages 402--416, May 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. C. Grier, S. Tang, and S. T. King. Designing and implementing the OP and OP2 web browsers. ACM Trans. Web, 5:11:1--11:35, May 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. V. Gundy and H. Chen. Noncespaces: Using randomization to enforce information flow tracking and thwart cross-site scripting attacks. In Proceedings of the Network and Distributed System Security Symposium, February 2009.Google ScholarGoogle Scholar
  17. R. Hansen and J. Grossman. Clickjacking, September 2008. http://www.sectheory.com/clickjacking.htm.Google ScholarGoogle Scholar
  18. T. Jim, N. Swamy, and M. Hicks. Defeating script injection attacks with browser-enforced embedded policies. In Proceedings of the 16th international conference on World Wide Web, WWW '07, pages 601--610, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R. Kohavi and F. Provost. Glossary of terms. Machine Learning, 30(2):271--274, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. D. M. Kristol. Http cookies: Standards, privacy, and politics. ACM Trans. Internet Technol., 1:151--198, November 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. E. Lawrence. Combating clickjacking with X-Frame-Options, March 2010. http://blogs.msdn.com/b/ieinternals/archive/2010/03/30/combating-clickj%acking- with-x-frame-options.aspx.Google ScholarGoogle Scholar
  22. G. Maone. NoScript - JavaScript/Java/Flash blocker for a safer Firefox experience!, 2008. http://noscript.net/.Google ScholarGoogle Scholar
  23. Y. Nadji, P. Saxen, and D. Song. Document structure integrity: A robust basis for cross-site scripting defense. In Proceedings of the Network and Distributed System Security Symposium, February 2009.Google ScholarGoogle Scholar
  24. E. V. Nava and D. Lindsay. Abusing internet explorer 8's xss filters. http://p42.us/ie8xss/Abusing_IE8s_XSS_Filters.pdf, 2010.Google ScholarGoogle Scholar
  25. D. Ross. IEBlog : IE8 Security Part IV: The XSS Filter, 2008. http://blogs.msdn.com/ie/archive/2008/07/01/ie8-security-part-iv-the-xs%s-filter.aspx.Google ScholarGoogle Scholar
  26. G. Rydstedt, E. Bursztein, D. Boneh, and C. Jackson. Busting frame busting: a study of clickjacking vulnerabilities at popular sites. In in IEEE Oakland Web 2.0 Security and Privacy (W2SP 2010), 2010.Google ScholarGoogle Scholar
  27. P. Saxena, S. Hanna, P. Poosankam, and D. Song. FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications. In Proceedings of the 17th Network and Distributed System Security Symposium (NDSS), February 2010.Google ScholarGoogle Scholar
  28. U. Shankar and C. Karlof. Doppelganger: Better browser privacy without the bother. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), pages 154--167, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. C. E. Shannon. A mathematical theory of communication. The Bell System Technical Journal, 27:379--423,623--656, July, October 1948.Google ScholarGoogle ScholarCross RefCross Ref
  30. K. Singh, A. Moshchuk, H. J. Wang, and W. Lee. On the incoherencies in web browser access control policies. In Proceedings of the IEEE Symposium on Security and Privacy, May 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. P. Stone. Next generation clickjacking, April 2010. http://www.contextis.co.uk/resources/white-papers/clickjacking/Context-%Clickjacking_white_paper.pdf.Google ScholarGoogle Scholar
  32. Symantec Inc. Symantec global Internet security threat report: Trends for 2008, April 2009. http://www.symantec.com/business/theme.jsp?themeid=threatreport.Google ScholarGoogle Scholar
  33. S. Tang, C. Grier, O. Aciicmez, and S. T. King. Alhambra: a system for creating, enforcing, and testing browser security policies. In Proceedings of the 19th international conference on World wide web, WWW '10, pages 941--950, New York, NY, USA, 2010. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. S. Tang, H. Mai, and S. T. King. Trust and protection in the illinois browser operating system. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10, Berkeley, CA, USA, 2010. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. M. Ter Louw and V. Venkatakrishnan. Blueprint: Robust prevention of cross-site scripting attacks for existing browsers. In Proceedings IEEE Symposium on Security and Privacy, pages 331--346, May 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Twitter. Clickjacking blocked, February 2009. http://blog.twitter.com/2009/02/clickjacking-blocked.html.Google ScholarGoogle Scholar
  37. P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Kruegel, and G. Vigna. Cross-site scripting prevention with dynamic data tainting and static analysis. In Proceedings of the Network and Distributed System Security Symposium (NDSS), February 2007.Google ScholarGoogle Scholar
  38. W3C. HTML 5. http://www.w3.org/TR/html5/.Google ScholarGoogle Scholar
  39. W3C. The iframe element. http://www.w3.org/TR/html5/the-iframe-element.html.Google ScholarGoogle Scholar
  40. H. J. Wang, X. Fan, J. Howell, and C. Jackson. Protection and communication abstractions for web browsers in MashupOS. In Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP), October 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. H. J. Wang, C. Grier, A. Moshchuk, S. T. King, P. Choudhury, and H. Venter. The multi-principal OS construction of the Gazelle web browser. In Proceedings of the 2009 USENIX Security Symposium, August 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. W. Zeller and E. W. Felten. Cross-site request forgeries: Exploitation and prevention. Technical report, Princeton University, October 2008. http://www.freedom-to-tinker.com/sites/default/files/csrf.pdf.Google ScholarGoogle Scholar

Index Terms

  1. Fortifying web-based applications automatically

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCS '11: Proceedings of the 18th ACM conference on Computer and communications security
        October 2011
        742 pages
        ISBN:9781450309486
        DOI:10.1145/2046707

        Copyright © 2011 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 17 October 2011

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CCS '11 Paper Acceptance Rate60of429submissions,14%Overall Acceptance Rate1,261of6,999submissions,18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader