首页> 外文会议>IEEE Symposium on Security and Privacy >Detecting Filter List Evasion with Event-Loop-Turn Granularity JavaScript Signatures
【24h】

Detecting Filter List Evasion with Event-Loop-Turn Granularity JavaScript Signatures

机译:检测滤波器列表逃避与事件循环圆形粒度JavaScript签名

获取原文

摘要

Content blocking is an important part of a per-formant, user-serving, privacy respecting web. Current content blockers work by building trust labels over URLs. While useful, this approach has many well understood shortcomings. Attackers may avoid detection by changing URLs or domains, bundling unwanted code with benign code, or inlining code in pages.The common flaw in existing approaches is that they evaluate code based on its delivery mechanism, not its behavior. In this work we address this problem by building a system for generating signatures of the privacy-and-security relevant behavior of executed JavaScript. Our system uses as the unit of analysis each script’s behavior during each turn on the JavaScript event loop. Focusing on event loop turns allows us to build highly identifying signatures for JavaScript code that are robust against code obfuscation, code bundling, URL modification, and other common evasions, as well as handle unique aspects of web applications.This work makes the following contributions to the problem of measuring and improving content blocking on the web: First, we design and implement a novel system to build per-event-loop-turn signatures of JavaScript behavior through deep instrumentation of the Blink and V8 runtimes. Second, we apply these signatures to measure how much privacy-and-security harming code is missed by current content blockers, by using EasyList and EasyPrivacy as ground truth and finding scripts that have the same privacy and security harming patterns. We build 1,995,444 signatures of privacy-and-security relevant behaviors from 11,212 unique scripts blocked by filter lists, and find 3,589 unique scripts hosting known harmful code, but missed by filter lists, affecting 12.48% of websites measured. Third, we provide a taxonomy of ways scripts avoid detection and quantify the occurrence of each. Finally, we present defenses against these evasions, in the form of filter list additions where possible, and through a proposed, signature based system in other cases.As part of this work, we share the implementation of our signature-generation system, the data gathered by applying that system to the Alexa 100K, and 586 AdBlock Plus compatible filter list rules to block instances of currently blocked code being moved to new URLs.
机译:内容阻止是每种氟氯醛,用户服务,隐私尊重Web的重要组成部分。当前内容通过URL构建信任标签来解决。虽然有用,但这种方法有许多很好的理解缺点。攻击者可以避免通过更改URL或域,捆绑在良性代码的不需要的代码或页面中的内联代码来避免检测。现有方法中的共同缺陷是它们根据其传送机制评估代码,而不是其行为。在这项工作中,我们通过构建一个生成所执行的JavaScript的隐私和安全相关行为的签名来解决这个问题。我们的系统用作每个脚本在每个脚本在JavaScript事件循环中的每个脚本的行为的单位。关注事件循环转向允许我们为JavaScript代码构建高度识别的签名,这些代码是对代码混淆,代码捆绑,URL修改和其他公共日常的常见次数的强大,以及处理Web应用程序的独特方面。这项工作使以下贡献成为以下贡献测量和改进网页内容阻止的问题:首先,我们设计并实施一种新颖的系统,通过闪烁和v8运行时的深度仪器来构建JavaScript行为的每个事件循环签名。其次,我们应用这些签名来衡量当前内容阻止者错过了许多隐私和安全危害代码,通过使用EasyList和EasyPrivacy作为地面真理以及寻找具有相同隐私和安全危害模式的脚本。从过滤列表阻止的11,212个唯一脚本构建了1,995,444个隐私和安全相关行为的签名,找到了托管已知有害代码的3,589个唯一脚本,但筛选出来的筛选列表,影响了12.48%的网站测量的网站。第三,我们提供一种脚本的分类学避免检测和量化每个的发生。最后,我们以筛选列表的形式出现防御,以筛选列表添加,在可能的情况下,通过建议的基于签名的系统在其他情况下。在此工作的一部分,我们共享我们的签名生成系统,数据通过将该系统应用于Alexa 100k,而586 adblock加上兼容的过滤器列表规则,以阻止当前被阻止的代码的实例被移动到新的URL。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号