Web-Defense - client-side protection against web attacks
Web-Defense - client-side protection against web attacks
Disciplines
Computer Sciences (100%)
Keywords
-
Security,
Web security,
Phishing,
Cross-site scripting attacks,
Spyware
The Internet, and in particular the world-wide web, have become part of the everyday life of millions of people. In recent years, however, it has also turned into a hostile and dangerous place. Besides traditional attacks against web servers and web-based applications, attackers are increasingly aiming at end-users. Novel threats have emerged in which the adversaries are not only interested in taking control of remote machines, but also in stealing sensitive information from their users. A common theme among such client-side attacks, which include phishing, cross-site scripting attacks, and spyware, is that sensitive information in possession of the victim is illicitly transmitted to the attacker. That is, an unauthorized information flow from the victim to the attacker occurs. As a result, the attacker can obtain access to authentication tokens such as passwords or session cookies and personal data such as credit card or social security numbers. This information is then abused for online fraud and identity theft. Traditional attack venues such as buffer overruns or exploits of input validation errors have been known for a long time and are widely understood. As a result, a large number of defense mechanisms have been devised. For client- side attacks, however, only a few viable defense solutions have emerged so far. These techniques often focus on one particular problem area only and fail to address the larger and more general problem of unauthorized information flow attacks. In this project, we propose to develop novel client-side defense solutions that protect users from unintentional disclosure of sensitive information. The idea is to put client-side attacks into a unified context and analyze their common and distinct properties. The result is a model to characterize client-side attacks that helps to identify regions in the solution space that have not been explored so far. Based on our model, we will develop practical techniques to counter the identified threats.
The Internet, and in particular the world-wide web, have become part of the everyday life of millions of people. In recent years, however, it has also turned into a hostile and dangerous place. Besides traditional attacks against web servers and web-based applications, attackers are increasingly aiming at end-users. Novel threats have emerged in which the adversaries are not only interested in taking control of remote machines, but also in stealing sensitive information from their users. A common theme among such client-side attacks, which include phishing, cross-site scripting attacks, and spyware, is that sensitive information in possession of the victim is illicitly transmitted to the attacker. That is, an unauthorized information flow from the victim to the attacker occurs. As a result, the attacker can obtain access to authentication tokens such as passwords or session cookies and personal data such as credit card or social security numbers. This information is then abused for online fraud and identity theft. Traditional attack venues such as buffer overruns or exploits of input validation errors have been known for a long time and are widely understood. As a result, a large number of defense mechanisms have been devised. For client-side attacks, however, only a few viable defense solutions have emerged so far. These techniques often focus on one particular problem area only and fail to address the larger and more general problem of unauthorized information flow attacks. The Webdefense project aimed to develop novel client-side defence solutions that aim to protect users from unintentional disclosure of sensitive information. The idea was to put client-side attacks into a unified context and analyze their common and distinct properties. The result is a model to characterize client-side attacks that helps to identify regions in the solution space that have not been explored so far. Based on our models, we developed practical techniques to counter the identified threats.
- Technische Universität Wien - 100%
Research Output
- 1510 Citations
- 15 Publications
-
2008
Title Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications DOI 10.1109/sp.2008.22 Type Conference Proceeding Abstract Author Balzarotti D Pages 387-401 -
2008
Title Visual-similarity-based phishing detection DOI 10.1145/1460877.1460905 Type Conference Proceeding Abstract Author Medvet E Pages 1-6 -
2010
Title A Practical Attack to De-Anonymize Social Network Users DOI 10.1109/sp.2010.21 Type Conference Proceeding Abstract Author Wondracek G Pages 223-238 -
2010
Title A solution for the automated detection of clickjacking attacks DOI 10.1145/1755688.1755706 Type Conference Proceeding Abstract Author Balduzzi M Pages 135-144 -
2009
Title SWAP: Mitigating XSS Attacks using a Reverse Proxy DOI 10.1109/iwsess.2009.5068456 Type Conference Proceeding Abstract Author Wurzinger P Pages 33-39 Link Publication -
2009
Title Client-side cross-site scripting protection DOI 10.1016/j.cose.2009.04.008 Type Journal Article Author Kirda E Journal Computers & Security Pages 592-604 -
2009
Title Prospex: Protocol Specification Extraction DOI 10.1109/sp.2009.14 Type Conference Proceeding Abstract Author Comparetti P Pages 110-125 -
2009
Title Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries DOI 10.3233/jcs-2009-0321 Type Journal Article Author Vigna G Journal Journal of Computer Security Pages 305-329 -
2010
Title Improving the efficiency of dynamic malware analysis DOI 10.1145/1774088.1774484 Type Conference Proceeding Abstract Author Bayer U Pages 1871-1878 -
2010
Title Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries DOI 10.1109/sp.2010.10 Type Conference Proceeding Abstract Author Kolbitsch C Pages 29-44 -
2010
Title CAPTCHA smuggling DOI 10.1145/1774088.1774483 Type Conference Proceeding Abstract Author Egele M Pages 1865-1870 -
2007
Title On the Effectiveness of Techniques to Detect Phishing Sites DOI 10.1007/978-3-540-73614-1_2 Type Book Chapter Author Ludl C Publisher Springer Nature Pages 20-39 -
2007
Title A Layout-Similarity-Based Approach for Detecting Phishing Pages DOI 10.1109/seccom.2007.4550367 Type Conference Proceeding Abstract Author Rosiello A Pages 1-10 Link Publication -
2007
Title Building Anti-Phishing Browser Plug-Ins: An Experience Report DOI 10.1109/sess.2007.6 Type Conference Proceeding Abstract Author Raffetseder T Pages 1-7 -
2006
Title Preventing Cross Site Request Forgery Attacks DOI 10.1109/seccomw.2006.359531 Type Conference Proceeding Abstract Author Jovanovic N Pages 1-10