...
首页> 外文期刊>Journal of computer security >Scriptless attacks: Stealing more pie without touching the sill
【24h】

Scriptless attacks: Stealing more pie without touching the sill

机译:无脚本攻击:偷更多的馅饼而不触碰门槛

获取原文
获取原文并翻译 | 示例

摘要

Due to their high practical impact, Cross-Site Scripting (XSS) attacks have attracted a lot of attention from the members of security community worldwide. In the same way, a plethora of more or less effective defense techniques have been proposed, addressing both causes and effects of XSS vulnerabilities. As a result, an adversary often can no longer inject or even execute arbitrary scripting code in several real-life scenarios. In this article, we examine an attack surface that remains after XSS and similar scripting attacks are supposedly mitigated by preventing an attacker from executing JavaScript code. We address the question of whether an attacker really needs to execute JavaScript or similar functionality to perform attacks aiming for information theft. The surprising result is that an attacker can abuse Cascading Style Sheets (CSS) in combination with other Web techniques like plain HTML, inactive SVG images, or font files. Having employed several case studies, we discuss so called scriptless attacks and demonstrate that an adversary might not need to execute code to preserve his ability to extract sensitive information from well-protected websites. More precisely, we show that an attacker can use seemingly benign features to build side-channel attacks that measure and exfiltrate almost arbitrary data displayed on a given webpage. We conclude this article with a discussion of potential mitigation techniques against this class of attacks. In addition, we have implemented a browser patch that enables a website to make a vital determination as to being loaded in a detached view or a pop-up window. This approach proves useful for prevention of certain types of attacks we here discuss.
机译:跨站点脚本(XSS)攻击由于具有很高的实际影响,因此引起了全球安全社区成员的广泛关注。同样,已经提出了许多或多或少有效的防御技术,以解决XSS漏洞的原因和影响。结果,在几种现实情况下,对手通常无法再注入甚至执行任意脚本代码。在本文中,我们研究了在XSS之后仍然存在的攻击面,并且可以通过防止攻击者执行JavaScript代码来缓解类似的脚本攻击。我们解决了攻击者是否真的需要执行JavaScript或类似功能来进行针对信息盗窃的攻击的问题。令人惊讶的结果是,攻击者可以结合其他Web技术(例如纯HTML,无效的SVG图像或字体文件)滥用级联样式表(CSS)。在进行了一些案例研究之后,我们讨论了所谓的无脚本攻击,并证明了对手可能不需要执行代码来保留其从受良好保护的网站中提取敏感信息的能力。更确切地说,我们表明,攻击者可以使用看似良性的功能来构建侧通道攻击,这些攻击可以测量和窃取在给定网页上显示的几乎任意数据。在本文的结尾,我们讨论了针对此类攻击的潜在缓解技术。此外,我们已经实现了浏览器补丁,使网站可以做出至关重要的决定,以使其独立于视图或弹出窗口中。事实证明,这种方法对于预防我们在此讨论的某些类型的攻击很有用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号