【24h】

WYSISNWIV: What You Scan Is Not What I Visit

机译:WYSISNWIV:您所扫描的不是我所访问的

获取原文

摘要

A variety of attacks, including remote-code execution exploits, malware, and phishing, are delivered to users over the web. Users are lured to malicious websites in various ways, including through spam delivered over email and instant messages, and by links injected in search engines and popular benign websites. In response to such attacks, many initiatives, such as Google's Safe Browsing, are trying to make the web a safer place by scanning URLs to automatically detect and blacklist malicious pages. Such blacklists are then used to block dangerous content, take down domains hosting malware, and warn users that have clicked on suspicious links. However, they are only useful, when scanners and browsers address the web the same way. This paper presents a study that exposes differences on how browsers and scanners parse URLs. These differences leave users vulnerable to malicious web content, because the same URL leads the browser to one page, while the scanner follows the URL to scan another page. We experimentally test all major browsers and URL scanners, as well as various applications that parse URLs, and discover multiple discrepancies. In particular, we discover that pairing Firefox with the blacklist produced by Google's Safe Browsing, leaves Firefox users exposed to malicious content hosted under URLs including the backslash character. The problem is a general one and aifects various applications and URL scanners. Even though, the solution is technically straightforward, it requires that multiple parties follow the same standard when parsing URLs. Currently, the standard followed by an application, seems to be unconsciously dictated by the URL parser implementation it is using, while most browsers have strayed from the URL RFC.
机译:各种攻击,包括远程代码执行漏洞,恶意软件和网络钓鱼,都通过Web传递给用户。通过多种方式诱使用户进入恶意网站,包括通过电子邮件和即时消息传递垃圾邮件,以及通过注入搜索引擎和受欢迎的良性网站的链接。为了应对此类攻击,许多举措(例如Google的“安全浏览”)都在尝试通过扫描URL来自动检测恶意网页并将其列入黑名单,从而使网络变得更加安全。然后,此类黑名单将用于阻止危险内容,删除托管恶意软件的域,并警告单击可疑链接的用户。但是,仅当扫描仪和浏览器以相同方式访问网络时,它们才有用。本文提出了一项研究,揭示了浏览器和扫描器解析URL的方式上的差异。这些差异使用户容易受到恶意Web内容的攻击,因为相同的URL会将浏览器引导至一个页面,而扫描程序将遵循该URL来扫描另一页面。我们实验性地测试了所有主要的浏览器和URL扫描器以及解析URL并发现多个差异的各种应用程序。特别是,我们发现将Firefox与Google的安全浏览产生的黑名单配对,会使Firefox用户暴露于URL(包括反斜杠字符)下托管的恶意内容。问题是一个普遍的问题,影响到各种应用程序和URL扫描程序。即使该解决方案在技术上很简单,但是在解析URL时,它要求多方遵循相同的标准。当前,应用程序遵循的标准似乎是由它正在使用的URL解析器实现无意识地决定的,而大多数浏览器却偏离了URL RFC。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号