SFS-HTTP: Securing the Web with Self-Certifying URLs

نویسندگان

  • Michael Kaminsky
  • Eric Banks
چکیده

The current solution to secure Web communication is SSL which relies on certificate authorities for key management, limiting the ability for individuals to independently set up secure Web sites and forcing them to trust a small number of third parties. We propose a new model for Web security— SFS-HTTP—based on SFS. While SFS uses self-certifying pathnames to separate key management from file system security, SFS-HTTP uses self-certifying URLs to separate key management from Web security. Users and Web site maintainers can define their own security models without having to rely on centralized certification authorities. We implement SFS-HTTP using the SFS libraries; users configure host authentication through the SFS agent.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SFS-Knoppix which Boots from Internet

KNOPPIX is a bootable CD with a collection of GNU/Linux software. KNOPPIX is very convenient but it requires downloading 700MB iso image and burning a CD-ROM when it is renewed. In order to solve this problem we make SFS-KNOPPIX which boots from Internet with SFS (Self-certifying File System). SFSKNOPPIX requires 20MB boot-loader with Linux-kernel and miniroot. Root file system is obtained from...

متن کامل

Hunting Cross-Site Scripting Attacks in the Network

Cross-site Scripting (XSS) attacks in web applications are considered a major threat. In a yearly basis, large IT security vendors export statistics that highlight the need for designing and implementing more efficient countermeasures for securing modern web applications and web users. So far, all these studies are carried out by IT security vendors. The academic community lacks of the tools fo...

متن کامل

Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification

Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...

متن کامل

Analyzing Android Browser Apps for file: // Vulnerabilities

Securing browsers in mobile devices is very challenging, because these browser apps usually provide browsing services to other apps in the same device. A malicious app installed in a device can potentially obtain sensitive information through a browser app. In this paper, we identify four types of attacks in Android, collectively known as FileCross, that exploits the vulnerable file:// to obtai...

متن کامل

2001 - 08 - 02 Proceedings of the Sixth International Workshop on Web Caching and Content Distribution

In this paper we describe the Medusa proxy, a tool for exploring user-perceived Web performance. The Medusa proxy is a non-caching forwarding proxy used in conjunction with a user’s browser. The two key features that the Medusa proxy provides are (1) the ability to simultaneously mirror HTTP requests from the browser to different Web delivery systems and directly compare the results, and (2) th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007