Identifying Cross-origin Resource Status Using Application Cache

被引:12
|
作者
Lee, Sangho [1 ]
Kim, Hyungsub [1 ]
Kim, Jong [1 ]
机构
[1] POSTECH, Dept Comp Sci & Engn, Pohang, South Korea
来源
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015) | 2015年
关键词
D O I
10.14722/ndss.2015.23027
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
HTML5 Application Cache (AppCache) allows web applications to cache their same- and cross-origin resources in the local storage of a web browser to enable offline access. However, cross-origin resource caching in AppCache has potential security and privacy problems. In this paper, we consider a novel web privacy attack that exploits cross-origin AppCache. Our attack allows a remote web attacker to exploit a victim web browser to exactly identify the status of target URLs: existence, redirection, or error. Especially, our attack can be performed without using client-side scripts, can concurrently identify the status of multiple URLs, and can exactly identify the redirections of target URLs. We further demonstrate advanced attacks that leverage the basic attack to de-anonymize and fingerprint victims. First, we determine the login status of a victim web browser by identifying URL redirections or errors due to absent or erroneous login information. Second, we probe internal web servers located in the local network of a victim web browser by identifying URL existence. We also suggest an effective countermeasure to mitigate the proposed attacks.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Request and Conquer: Exposing Cross-Origin Resource Size
    Van Goethem, Tom
    Vanhoef, Mathy
    Piessens, Frank
    Joosen, Wouter
    PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 447 - 462
  • [2] Method Resource Sharing in On-Premises Environment Based on Cross-Origin Resource Sharing and its Application for Safety-First Constructions
    Arai, Kohei
    Norikoshi, Kodai
    Oda, Mariko
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (05) : 670 - 675
  • [3] Protecting Browsers from Cross-Origin CSS Attacks
    Huang, Lin-Shung
    Evans, Chris
    Weinberg, Zack
    Jackson, Collin
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 619 - 629
  • [4] An Automatic Data Service Generation Approach for Cross-origin Datasets
    Zhang, Yuanming
    Huang, Langyou
    Lu, Jiawei
    Xiao, Gang
    WEB ENGINEERING (ICWE 2019), 2019, 11496 : 374 - 390
  • [5] Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests
    Burnett, Sam
    Feamster, Nick
    SIGCOMM'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2015, : 653 - 667
  • [6] Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests
    Burnett, Sam
    Feamster, Nick
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2015, 45 (04) : 653 - 667
  • [7] Modalflow: Cross-Origin Flow Data Visualization for Urban Mobility
    Perez-Messina, Ignacio
    Graells-Garrido, Eduardo
    Lobo, Maria Jesus
    Hurter, Christophe
    ALGORITHMS, 2020, 13 (11) : 1 - 18
  • [8] Careful Who You Trust: Studying the Pitfalls of Cross-Origin Communication
    Meiser, Gordon
    Laperdrix, Pierre
    Stock, Ben
    ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 110 - 122
  • [9] Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks
    Sudhodanan, Avinash
    Khodayari, Soheil
    Caballero, Juan
    27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
  • [10] CSP & Co. Can Save Us from a Rogue Cross-Origin Storage Browser Network! But for How Long?
    Rodriguez, Juan D. Parra
    Posegga, Joachim
    PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 170 - 172