CDF: Predictably Secure Web Documents
Peter Snyder*, Laura Watiker†, Cynthia Taylor*, Chris Kanich*
* University of Illinois at Chicago † Oberlin College
CDF: Predictably Secure Web Documents Peter Snyder * , Laura Watiker - - PowerPoint PPT Presentation
CDF: Predictably Secure Web Documents Peter Snyder * , Laura Watiker , Cynthia Taylor * , Chris Kanich * * University of Illinois at Chicago Oberlin College Overview The web is great! But complex! Complexity makes reasoning
Peter Snyder*, Laura Watiker†, Cynthia Taylor*, Chris Kanich*
* University of Illinois at Chicago † Oberlin College
security difficult for consumers
Is there a way to improve web security and privacy, without preventing authors from creating the types
JavaScript
Web API Standard # Sites Uses % Blocked Gamepad 3 0.0% Performance Timeline, Lv. 2 1,728 93.7% WebRTC 1.0 28 29.2% XMLHttpRequest 7,957 13.9%
AJAX ALS BA BE CO CSS−CR CSS−FO CSS−OM CSS−VM DO DOM DOM1 DOM2−C DOM2−E DOM2−H DOM2−S DOM2−T DOM3−C DOM3−X DOM4 DOM−PS DU E EC EME F FA FULL GEO GIM GP H−B H−C H−CM H−HI H−P HRT HTML HTML5 HTML51 H−WB H−WS H−WW IDB MCD MCS MSE MSR NS NT PE PL PT PT2 PV RT SD SEL SLC SO SVG SW TC TPE UIE URL UTL V WCR WEBA WEBGL WEBVTT WN WRTC 10 100 1,000 10,000 0% 25% 50% 75% 100%
Sites using this standard
% of Usage blocked by Ghostery and Adblock #
Deployment
Keep Gain
code execution
tabs, network communication, etc)
Browser Proxy Server
No plugins, restricted Web API use
No JS means no JS based approaches (font / plugin enumeration, canvas fingerprinting, etc.)
No iframes, no HTTP referrers, restrictions on forms, “tracking speed bump"
Typing in CDF documents, no script injection
http://www.vogue.com/
https://www.bankofamerica.com/
https://twitter.com/
HotCRP
security and privacy online
predictable privacy and security, without sacrificing expressivity.
capability tradeoffs.