首页> 外文会议>Workshop on Advances in Information, Electronic and Electrical Engineering >Security Implications of Using Third-Party Resources in the World Wide Web
【24h】

Security Implications of Using Third-Party Resources in the World Wide Web

机译:在万维网中使用第三方资源的安全含义

获取原文

摘要

Modern web pages have nothing in common with the static connotation coming from the word “page” - it is a dynamic unique experience created by active content and executed within browser, just-in-time assembled from various resources hosted on many different domains. Active content increases attack surface naturally exposing users to many novel threats. A popular security advice has been to deploy active content blocker plugins like NoScript, unfortunately they are not capable to effectively stop the attacks. Content Security Policy (CSP) can be effective against these attacks, but we demonstrate how poor decisions made by website administrators or external resource hosters can render CSP ineffective. As a practical contribution, we have scanned Alexa Top Million web pages for insecure CSP configuration and conducted a follow up scan one year later to observe the changes. Initially only 2% of those web pages were observed to use CSP but in the follow-up the percentage more than doubled. We have found a substantial number of web pages with too loose CSP rules, about 5% of websites that have CSP still enable determined attacker to host malicious content on commercial external resources while fulfilling the CSP rule when exploiting Cross-Site Scripting vulnerability. We also provide a model for the problem domain, formalization of user and domain models, and preferred user security policy.
机译:现代网页与来自“页面”一词的静态内涵没有任何共同之处 - 它是由活动内容创建的动态独特的体验,并在浏览器中执行,从许多不同域上托管的各种资源中搬家。主动内容使攻击表面自然暴露于许多新颖的威胁。一个流行的安全建议一直是部署像noscript这样的活动内容阻止程序插件,不幸的是他们无法有效地停止攻击。内容安全策略(CSP)可以对这些攻击有效,但我们展示了网站管理员或外部资源托管的决策如何呈现CSP无效。作为一种实践贡献,我们已扫描Alexa高级网页,以便不安全的CSP配置进行,并一年后进行后续扫描以观察更改。最初只有2%的网页被观察到使用CSP,但在后续比例增加了一倍多。我们已经找到了具有太松散的CSP规则的Web页面,大约5%的网站具有CSP仍然使确定的攻击者能够在利用跨站点脚本漏洞时履行CSP规则时托管商业外部资源上的恶意内容。我们还为问题域,用户和域模型的形式化提供了一种模型,以及首选的用户安全策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号