Quantifying User Password Exposure to Third-Party CDNs

被引:0
|
作者
Xin, Rui [1 ]
Lin, Shihan [1 ]
Yang, Xiaowei [1 ]
机构
[1] Duke Univ, Durham, NC 27706 USA
来源
PASSIVE AND ACTIVE MEASUREMENT, PAM 2023 | 2023年 / 13882卷
关键词
HTTPS; CDN; Password; Security; Measurement;
D O I
10.1007/978-3-031-28486-1_27
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Web services commonly employ Content Distribution Networks (CDNs) for performance and security. As web traffic is becoming 100% HTTPS, more and more websites allow CDNs to terminate their HTTPS connections. This practice may expose a website's user sensitive information such as a user's login password to a third-party CDN. In this paper, we measure and quantify the extent of user password exposure to third-party CDNs. We find that among Alexa top 50K websites, at least 12,451 of them use CDNs and contain user login entrances. Among those websites, 33% of them expose users' passwords to the CDNs, and a popular CDN may observe passwords from more than 40% of its customers. This result suggests that if a CDN infrastructure has a vulnerability or an insider attack, many users' accounts will be at risk. If we assume the attacker is a passive eavesdropper, a website can avoid this vulnerability by encrypting users' passwords in HTTPS connections. Our measurement shows that less than 17% of the websites adopt this countermeasure.
引用
收藏
页码:652 / 668
页数:17
相关论文
共 50 条
  • [1] Contrasting Third-Party Package Management User Experience
    Islam, Syful
    Kula, Raula Gaikovina
    Treude, Christoph
    Chinthanet, Bodin
    Ishio, Takashi
    Matsumoto, Kenichi
    2021 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2021), 2021, : 664 - 668
  • [2] A look into user privacy and third-party applications in Facebook
    Seng, Sovantharith
    Al-Ameen, Mahdi Nasrullah
    Wright, Matthew
    INFORMATION AND COMPUTER SECURITY, 2021, 29 (02) : 283 - 313
  • [3] Detecting Third-Party User Trackers with Cookie Files
    Dudykevych, Valery
    Nechypor, Vitalii
    2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 78 - 80
  • [4] Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research
    Gamero-Garrido, Alexander
    Savage, Stefan
    Levchenko, Kirill
    Snoeren, Alex C.
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1501 - 1513
  • [5] Using third-party purchasing to push third-party logistics
    Long, JS
    Zhao, J
    THIRD WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS: GLOBAL BUSINESS INTERFACE, 2004, : 400 - 404
  • [6] A Comprehensive Study on Third-Party User Tracking in Mobile Applications
    Paci, Federica
    Pizzoli, Jacopo
    Zannone, Nicola
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [7] USER'S ADOPTION OF FREE THIRD-PARTY SECURITY APPS
    Han, Bo
    Wu, Yu
    Windsor, John
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2014, 54 (03) : 77 - 86
  • [8] THIRD-PARTY EVALUATION
    ETRIS, SF
    MATERIALS RESEARCH AND STANDARDS, 1972, 12 (11): : 7 - +
  • [9] Third-party payers
    不详
    JOURNAL OF THE AMERICAN DENTAL ASSOCIATION, 2005, 136 (10): : 1378 - 1378
  • [10] Third-Party Certification
    Goergen, Michael T., Jr.
    JOURNAL OF FORESTRY, 2009, 107 (05) : 232 - 232