Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning
نویسندگان
چکیده
In this paper, we present a systematic study of browser cache poisoning (BCP) attacks, wherein a network attacker performs a one-time Man-In-The-Middle (MITM) attack on a user’s HTTPS session, and substitutes cached resources with malicious ones. We investigate the feasibility of such attacks on five mainstream desktop browsers and 16 popular mobile browsers. We find that browsers are highly inconsistent in their caching policies for loading resources over SSL connections with invalid certificates. In particular, the majority of desktop browsers (99% of the market share) and popular mobile browsers (over a billion user downloads) are affected by BCP attacks to a large extent. Existing solutions for safeguarding HTTPS sessions fail to provide comprehensive defense against this threat. We provide guidelines for users and browser vendors to defeat BCP attacks. Meanwhile, we propose defense techniques for website developers to mitigate an important subset of BCP attacks on existing browsers without cooperation of users and browser vendors. We have reported our findings to browser vendors and confirmed the vulnerabilities. For example, Google has acknowledged the vulnerability we reported in Chrome’s HTML5 AppCache and has fixed the problem according to our suggestion. © 2015 Elsevier Ltd. All rights reserved.
منابع مشابه
Poster: Man-in-the-Browser-Cache: Persisting HTTPS Attacks via Browser Cache Poisoning
When browsing the web using HTTPS, if a user Alice ignores, or clicks through, the browser’s SSL warnings of an invalid SSL certificate, she exposes her browser sessions to a Man-in-the-middle (MITM) attack, allowing attackers to intercept communication in the SSL channel. Recent work has measured the click-through rates for SSL warnings, indicating that more than 50% users click through SSL wa...
متن کاملWeb Browser Security: Different Attacks Detection and Prevention Techniques
In this paper, we present a systematic study of how to make a browser secure. Web browser is vulnerable to different attacks; these attacks are performed due to vulnerabilities in the UI of the web page, Browser cache memory, extensions, plug-in. The Attacker can run malicious JavaScript to exploit user system by using these vulnerabilities. Buffer overflow attack, Cross-site-scripting, Man-in-...
متن کاملPatching Browsers and DNS Clients to Foil Timing Attacks
Timing attacks exploit a loophole that allows any website to deduce confidential information f rom a web user visiting the website by peeping into the user’s Internet cache or DNS resolver cache. Any unscrupulous attacker can also insert ‘cache cookies’ into the user’s Internet cache. The solutions, which have been proposed so far, are disabling the caches, the java script, java and domain tagg...
متن کاملIdentifying Cross-origin Resource Status Using Application Cache
HTML5 Application Cache (AppCache) allows web applications to cache their sameand cross-origin resources in the local storage of a web browser to enable offline access. However, cross-origin resource caching in AppCache has potential security and privacy problems. In this paper, we consider a novel web privacy attack that exploits cross-origin AppCache. Our attack allows a remote web attacker t...
متن کاملQuantifying Persistent Browser Cache Poisoning
Web browsers rely on caching for improving performance and for reducing bandwidth use. Cache poisoning poses alarming security concerns in light of HTTP’s lack of an integrity guarantee in conjunction with the properties of its caching behavior. In our previous study we demonstrated the simplicity of replacing objects in the browser cache with malicious code to enable a persistent attack. This ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Security
دوره 55 شماره
صفحات -
تاریخ انتشار 2015