首页> 外文会议>IEEE Symposium on Security and Privacy >The Cracked Cookie Jar: HTTP Cookie Hijacking and the Exposure of Private Information
【24h】

The Cracked Cookie Jar: HTTP Cookie Hijacking and the Exposure of Private Information

机译:破解的Cookie罐:HTTP Cookie劫持和私人信息泄露

获取原文

摘要

The widespread demand for online privacy, also fueled by widely-publicized demonstrations of session hijacking attacks against popular websites, has spearheaded the increasing deployment of HTTPS. However, many websites still avoid ubiquitous encryption due to performance or compatibility issues. The prevailing approach in these cases is to force critical functionality and sensitive data access over encrypted connections, while allowing more innocuous functionality to be accessed over HTTP. In practice, this approach is prone to flaws that can expose sensitive information or functionality to third parties. In this paper, we conduct an in-depth assessment of a diverse set of major websites and explore what functionality and information is exposed to attackers that have hijacked a user's HTTP cookies. We identify a recurring pattern across websites with partially deployed HTTPS, service personalization inadvertently results in the exposure of private information. The separation of functionality across multiple cookies with different scopes and inter-dependencies further complicates matters, as imprecise access control renders restricted account functionality accessible to non-session cookies. Our cookie hijacking study reveals a number of severe flaws, attackers can obtain the user's home and work address and visited websites from Google, Bing and Baidu expose the user's complete search history, and Yahoo allows attackers to extract the contact list and send emails from the user's account. Furthermore, e-commerce vendors such as Amazon and Ebay expose the user's purchase history (partial and full respectively), and almost every website exposes the user's name and email address. Ad networks like Doubleclick can also reveal pages the user has visited. To fully evaluate the practicality and extent of cookie hijacking, we explore multiple aspects of the online ecosystem, including mobile apps, browser security mechanisms, extensions and search bars. To estimate the extent of the threat, we run IRB-approved measurements on a subset of our university's public wireless network for 30 days, and detect over 282K accounts exposing the cookies required for our hijacking attacks. We also explore how users can protect themselves and find that, while mechanisms such as the EFF's HTTPS Everywhere extension can reduce the attack surface, HTTP cookies are still regularly exposed. The privacy implications of these attacks become even more alarming when considering how they can be used to deanonymize Tor users. Our measurements suggest that a significant portion of Tor users may currently be vulnerable to cookie hijacking.
机译:在线隐私的广泛需求,也受到广泛流行的针对流行网站的会话劫持攻击的演示的推动,带动了HTTPS的日益部署。但是,由于性能或兼容性问题,许多网站仍然避免普遍加密。在这些情况下,流行的方法是通过加密连接强制执行关键功能和敏感数据访问,同时允许通过HTTP访问更多无害功能。在实践中,此方法容易出现漏洞,这些漏洞可能会将敏感信息或功能暴露给第三方。在本文中,我们对各种主要网站进行了深入评估,并探讨了劫持用户HTTP cookie的攻击者所能获得的功能和信息。我们在部分部署HTTPS的网站上确定了重复出现的模式,服务个性化无意中导致了私人信息的泄露。跨多个具有不同作用域和相互依赖性的cookie的功能分离进一步使事情变得复杂,因为不精确的访问控制使非会话cookie可以访问受限的帐户功能。我们的Cookie劫持研究揭示了许多严重的漏洞,攻击者可以从Google获取用户的住所和工作地址以及访问过的网站,Bing和Baidu可以暴露用户的完整搜索历史记录,而Yahoo允许攻击者提取联系人列表并从中发送电子邮件。用户的帐户。此外,诸如Amazon和Ebay之类的电子商务供应商会公开用户的购买历史记录(分别为部分和完整),几乎每个网站都公开用户的姓名和电子邮件地址。 Doubleclick等广告网络也可以显示用户访问过的网页。为了全面评估Cookie劫持的实用性和程度,我们探索了在线生态系统的多个方面,包括移动应用程序,浏览器安全机制,扩展和搜索栏。为了评估威胁的程度,我们在大学的公共无线网络的子集上运行了IRB批准的评估,为期30天,并检测了超过282K帐户,这些帐户暴露了我们的劫持攻击所需的cookie。我们还探讨了用户如何保护自己,并发现,尽管EFF的HTTPS Everywhere扩展之类的机制可以减少攻击面,但HTTP cookie仍会定期暴露。当考虑如何使用它们来使Tor用户匿名时,这些攻击的隐私含义变得更加令人震惊。我们的测量结果表明,Tor用户中目前有很大一部分可能容易受到cookie劫持的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号