首页> 外文会议>IEEE Workshop on Advances in Information, Electronic and Electrical Engineering >Security Implications of Using Third-Party Resources in the World Wide Web
【24h】

Security Implications of Using Third-Party Resources in the World Wide Web

机译:在万维网上使用第三方资源的安全隐患

获取原文

摘要

Modern web pages have nothing in common with the static connotation coming from the word “page” - it is a dynamic unique experience created by active content and executed within browser, just-in-time assembled from various resources hosted on many different domains. Active content increases attack surface naturally exposing users to many novel threats. A popular security advice has been to deploy active content blocker plugins like NoScript, unfortunately they are not capable to effectively stop the attacks. Content Security Policy (CSP) can be effective against these attacks, but we demonstrate how poor decisions made by website administrators or external resource hosters can render CSP ineffective. As a practical contribution, we have scanned Alexa Top Million web pages for insecure CSP configuration and conducted a follow up scan one year later to observe the changes. Initially only 2% of those web pages were observed to use CSP but in the follow-up the percentage more than doubled. We have found a substantial number of web pages with too loose CSP rules, about 5% of websites that have CSP still enable determined attacker to host malicious content on commercial external resources while fulfilling the CSP rule when exploiting Cross-Site Scripting vulnerability. We also provide a model for the problem domain, formalization of user and domain models, and preferred user security policy.
机译:现代网页与“页面”一词的静态含义没有什么共通之处-它是一种动态的独特体验,它由活动内容创建并在浏览器中执行,并由来自许多不同域的各种资源及时组合而成。主动内容增加了攻击面,自然使用户面临许多新颖的威胁。流行的安全建议是部署活动内容阻止程序插件(如NoScript),但不幸的是,它们无法有效阻止攻击。内容安全策略(CSP)可以有效地抵御这些攻击,但是我们展示了网站管理员或外部资源托管者的错误决定如何使CSP失效。作为实际的贡献,我们扫描了Alexa Top Million网页中不安全的CSP配置,并在一年后进行了后续扫描以观察变化。最初,只有2%的网页使用CSP,但随后的百分比增加了一倍以上。我们发现大量的网页具有过于宽松的CSP规则,大约5%的具有CSP的网站仍使坚定的攻击者能够利用商业上的外部资源来托管恶意内容,同时在利用跨站点脚本漏洞时满足CSP规则。我们还为问题域,用户和域模型的形式化以及首选的用户安全策略提供了一个模型。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号