DOMtegrity: ensuring web page integrity against malicious browser extensions

被引:8
作者
Toreini, Ehsan [1 ]
Mehrnezhad, Maryam [2 ]
Shahandashti, Siamak F. [1 ]
Hao, Feng [3 ]
机构
[1] Newcastle Univ, Sch Comp, Newcastle Upon Tyne, Tyne & Wear, England
[2] Univ York, Dept Comp Sci, York, N Yorkshire, England
[3] Univ Warwick, Dept Comp Sci, Coventry, W Midlands, England
基金
英国工程与自然科学研究理事会;
关键词
Web page integrity; Web Crypto API; Browser extension; WebExtension; Man in the browser; !text type='Java']Java[!/text]Script; DOMtegrity;
D O I
10.1007/s10207-019-00442-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we address an unsolved problem in the real world: how to ensure the integrity of the web content in a browser in the presence of malicious browser extensions? The problem of exposing confidential user credentials to malicious extensions has been widely understood, which has prompted major banks to deploy two-factor authentication. However, the importance of the "integrity" of the web content has received little attention. We implement two attacks on real-world online banking websites and show that ignoring the "integrity" of the web content can fundamentally defeat two-factor solutions. To address this problem, we propose a cryptographic protocol called DOMtegrity to ensure the end-to-end integrity of theDOMstructure of a web page from delivering at a web server to the rendering of the page in the user's browser. DOMtegrity is the first solution that protects DOM integrity without modifying the browser architecture or requiring extra hardware. It works by exploiting subtle yet important differences between browser extensions and in-line JavaScript code. We show how DOMtegrity prevents the earlier attacks and a whole range of man-in-the-browser attacks. We conduct extensive experiments on more than 14,000 real-world extensions to evaluate the effectiveness of DOMtegrity.
引用
收藏
页码:801 / 814
页数:14
相关论文
共 23 条
[1]  
Adham Manal., 2013, Financial Cryptography and Data Security, P322
[2]  
Alcorn W., 2014, The Browser Hacker's Handbook
[3]  
[Anonymous], 2010, P USENIX SEC
[4]   A secure and reliable bootstrap architecture [J].
Arbaugh, WA ;
Farber, DJ ;
Smith, JM .
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, :65-71
[5]   Analyzing Information Flow in Java']JavaScript-based Browser Extensions [J].
Dhawan, Mohan ;
Ganapathy, Vinod .
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, :382-391
[6]   Man in the Browser Attacks [J].
Dougan, Timothy ;
Curran, Kevin .
INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2012, 4 (01) :29-39
[7]  
Gibbs Samuel., 2014, The Guardian
[8]   Verified Security for Browser Extensions [J].
Guha, Arjun ;
Fredrikson, Matthew ;
Livshits, Benjamin ;
Swamy, Nikhil .
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, :115-130
[9]  
Heiderich M, 2011, LECT NOTES COMPUT SC, V6961, P281, DOI 10.1007/978-3-642-23644-0_15
[10]  
Jagpal N, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P579