首页> 外文会议>Engineering secure software and systems >CsFire: Transparent Client-Side Mitigation ofMalicious Cross-Domain Requests
【24h】

CsFire: Transparent Client-Side Mitigation ofMalicious Cross-Domain Requests

机译:CsFire:恶意客户端跨域请求的透明客户端缓解

获取原文
获取原文并翻译 | 示例

摘要

Protecting users in the ubiquitous online world is becoming more and more important, as shown by web application security -or the lack thereof - making the mainstream news. One of the more harmful attacks is cross-site request forgery (CSRF), which allows an attacker to make requests to certain web applications while impersonating the user without their awareness. Existing client-side protection mechanisms do not fully mitigate the problem or have a degrading effect on the browsing experience of the user, especially with web 2.0 techniques such as AJAX, mashups and single sign-on. To fill this gap, this paper makes three contributions: first, a thorough traffic analysis on real-world traffic quantifies the amount of cross-domain traffic and identifies its specific properties. Second, a client-side enforcement policy has been constructed and a Firefox extension, named CsFire (CeaseFire), has been implemented to autonomously mitigate CSRF attacks as precise as possible. Evaluation was done using specific CSRF scenarios, as well as in real-life by a group of test users. Third, the granularity of the client-side policy is improved even further by incorporating server-specific policy refinements about intended cross-domain traffic.
机译:Web应用程序安全性(或缺乏安全性)已成为主流新闻,这表明在无处不在的在线世界中保护用户变得越来越重要。跨站点请求伪造(CSRF)是更有害的攻击之一,它使攻击者可以向某些Web应用程序发出请求,同时冒充用户,而无需他们的意识。现有的客户端保护机制不能完全缓解问题或对用户的浏览体验产生不良影响,尤其是使用Web 2.0技术(例如AJAX,混搭和单点登录)时。为了填补这一空白,本文做出了三点贡献:首先,对实际流量进行全面的流量分析可以量化跨域流量并确定其特定属性。其次,已构建了客户端强制策略,并实施了名为CsFire(CeaseFire)的Firefox扩展,以尽可能精确地自主缓解CSRF攻击。使用特定的CSRF场景以及一组测试用户的真实生活进行评估。第三,通过合并有关预期跨域流量的特定于服务器的策略优化,可以进一步提高客户端策略的粒度。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号