Poster: Man-in-the-Browser-Cache: Persisting HTTPS Attacks via Browser Cache Poisoning
نویسندگان
چکیده
When browsing the web using HTTPS, if a user Alice ignores, or clicks through, the browser’s SSL warnings of an invalid SSL certificate, she exposes her browser sessions to a Man-in-the-middle (MITM) attack, allowing attackers to intercept communication in the SSL channel. Recent work has measured the click-through rates for SSL warnings, indicating that more than 50% users click through SSL warnings [1]. A typical solution is to improve warnings of invalid SSL certificates. However, in certain settings, users do not have a choice but to click through the warnings, e.g., when in a hotel WiFi with a malicious proxy that intercepts web sessions.
منابع مشابه
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning
In this paper, we present a systematic study of browser cache poisoning (BCP) attacks, wherein a network attacker performs a one-time Man-In-The-Middle (MITM) attack on a user’s HTTPS session, and substitutes cached resources with malicious ones. We investigate the feasibility of such attacks on five mainstream desktop browsers and 16 popular mobile browsers. We find that browsers are highly in...
متن کاملWeb Browser Security: Different Attacks Detection and Prevention Techniques
In this paper, we present a systematic study of how to make a browser secure. Web browser is vulnerable to different attacks; these attacks are performed due to vulnerabilities in the UI of the web page, Browser cache memory, extensions, plug-in. The Attacker can run malicious JavaScript to exploit user system by using these vulnerabilities. Buffer overflow attack, Cross-site-scripting, Man-in-...
متن کاملPatching Browsers and DNS Clients to Foil Timing Attacks
Timing attacks exploit a loophole that allows any website to deduce confidential information f rom a web user visiting the website by peeping into the user’s Internet cache or DNS resolver cache. Any unscrupulous attacker can also insert ‘cache cookies’ into the user’s Internet cache. The solutions, which have been proposed so far, are disabling the caches, the java script, java and domain tagg...
متن کاملIdentifying Cross-origin Resource Status Using Application Cache
HTML5 Application Cache (AppCache) allows web applications to cache their sameand cross-origin resources in the local storage of a web browser to enable offline access. However, cross-origin resource caching in AppCache has potential security and privacy problems. In this paper, we consider a novel web privacy attack that exploits cross-origin AppCache. Our attack allows a remote web attacker t...
متن کاملQuantifying Persistent Browser Cache Poisoning
Web browsers rely on caching for improving performance and for reducing bandwidth use. Cache poisoning poses alarming security concerns in light of HTTP’s lack of an integrity guarantee in conjunction with the properties of its caching behavior. In our previous study we demonstrated the simplicity of replacing objects in the browser cache with malicious code to enable a persistent attack. This ...
متن کامل