Rootkits for JavaScript Environments

نویسندگان

  • Ben Adida
  • Adam Barth
  • Collin Jackson
چکیده

A number of commercial cloud-based password managers use bookmarklets to automatically populate and submit login forms. Unfortunately, an attacker web site can maliciously alter the JavaScript environment and, when the login bookmarklet is invoked, steal the user’s passwords. We describe general attack techniques for altering a bookmarklet’s JavaScript environment and apply them to extracting passwords from six commercial password managers. Our proposed solution has been adopted by several of the commercial vendors.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Tools for Detecting Rootkits and Hidden Processes

Rootkits pose a dilemma in forensic investigations because hackers use them surreptitiously to mislead investigators. This paper analyzes the effectiveness of online and offline information analysis techniques in detecting rootkits and determining the processes and/or files hidden by rootkits. Five common rootkits were investigated using a live analysis tool, five rootkit detection tools (RDTs)...

متن کامل

Rootkits on Smart Phones: Attacks and Implications

Smart phones are increasingly being equipped with operating systems that compare in complexity with those on desktop computers. This trend makes smart phone operating systems vulnerable to many of the same threats as desktop operating systems. This paper examines the threat posed by rootkits to smart phones. Rootkits are malware that stealthily achieve their goals by modifying operating system ...

متن کامل

Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table

We introduce the notion of re-establishing trust in compromised systems, specifically looking at recovering from kernel-level rootkits. An attacker that has compromised a system will often install a set of tools, known as a rootkit, which will break trust in the system as well as serve the attacker with other functionalities. One type of rootkit is a kernel-level rootkit, which will patch runni...

متن کامل

Getting to the root of the problem.

Despite its maturity in certain computing environments, there appears to be a void in our awareness and understanding of the rootkit security menace. Rootkits are a form of malware that, once surreptitiously installed onto a victim’s computer, allow a perpetrator to gain administrative-level access, monitor activities, open backdoor access portals, and hide all evidence of its activities. After...

متن کامل

Debugging Cross-Platform Mobile Apps without Tool Break

Besides its use in the web, the JavaScript programming language has become the basis of some of today’s most important mobile cross-platform development tools. To enable and simplify debugging in such environments, this paper presents a novel method for debugging interpreted JavaScript code. The described method uses source code instrumentation to transform existing JavaScript programs in a way...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009