Oh, the Places You'll Go! Finding Our Way Back from the Web Platform's Ill-conceived Jaunts

被引:4
作者
Janc, Artur [1 ]
West, Mike [1 ]
机构
[1] Google Inc, Mountain View, CA 94043 USA
来源
2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020) | 2020年
关键词
D O I
10.1109/EuroSPW51379.2020.00096
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In its transition from the original concept of a mesh of hypertext documents [2] into the world's most successful application ecosystem, the open web platform [3] has steadily, iteratively, accumulated a large number of unsafe features and behaviors. These features lead to vulnerabilities in web applications, enable attacks on web users, and often add significant complexity to developers' mental models of the web and to user-agent implementations. In this paper, we start from a scattered list of concrete grievances about the web platform based on informal discussions among browser and web security engineers. After reviewing the details of these issues, we work towards a model of the root causes of the problems, categorizing them based on the type of risk they introduce to the platform. We then identify possible solutions for each class of issues, dividing them by the most effective approach to address it. In the end, we arrive at a general blueprint for backing out of these dead ends. We propose a three-pronged approach which includes changing web browser defaults, creating a slew of features for web authors to opt out of dangerous behaviors, and adding new security primitives. We then show how this approach can be practically applied to address each of the individual problems, providing a conceptual framework for solving unsafe legacy web platform behaviors.
引用
收藏
页码:673 / 680
页数:8
相关论文
共 38 条
[1]  
[Anonymous], 2000, P 7 ACM C COMPUTER C
[2]  
Barth A., RFC6265
[3]   Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves [J].
Barth, Adam ;
Caballero, Juan ;
Song, Dawn .
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, :360-371
[4]  
Bell D., 1975, SECURE COMPUTER SYST
[5]  
Berners-Lee T., 1989, CERN
[6]  
Bokan D., POSSIBLE SIDE CHANNE
[7]   Fault trees for security system design and analysis [J].
Brooke, PJ ;
Paige, RF .
COMPUTERS & SECURITY, 2003, 22 (03) :256-264
[8]  
Brown WH, 1998, AntiPatterns: refactoring software, architectures, and projects in crisis, V1st
[9]  
Clelland Ian, 2020, Permissions Policy
[10]  
Creager D., 2018, REPORTING API