A Privacy-Preserving Defense Mechanism Against Request Forgery Attacks

被引:3
|
作者
Fung, Ben S. Y. [1 ]
Lee, Patrick P. C. [1 ]
机构
[1] Chinese Univ Hong Kong, Dept Comp Sci & Engn, Hong Kong, Hong Kong, Peoples R China
关键词
D O I
10.1109/TrustCom.2011.10
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
One top vulnerability in today's web applications is request forgery, in which an attacker triggers an unintentional request from a client browser to a target website and exploits the client's privileges on the website. To defend against a general class of cross-site and same-site request forgery attacks, we propose DeRef, a practical defense mechanism that allows a website to apply line-grained access control on the scopes within which the client's authentication credentials can be embedded in requests. One key feature of DeRef is to enable privacy-preserving checking, such that the website does not know where the browser initiates requests, while the browser cannot infer the scopes being configured by the website. DeRef achieves this by using twophase checking, which leverages hashing and blind signature to make a trade-off between performance and privacy protection. We implement a proof-of-concept prototype of DeRef on FireFox and WordPress 2.0. We also evaluate our DeRef prototype and justify its performance overhead in various deployment scenarios.
引用
收藏
页码:45 / 52
页数:8
相关论文
共 50 条
  • [1] Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense Against Model Inversion Attacks
    Slokom, Manel
    de Wolf, Peter-Paul
    Larson, Martha
    [J]. INFORMATION SECURITY, ISC 2023, 2023, 14411 : 3 - 23
  • [2] Privacy-Preserving Trajectory Publication Against Parking Point Attacks
    Sui, Peipei
    Wo, Tianyu
    Wen, Zhangle
    Li, Xianxian
    [J]. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, 2013, : 569 - 574
  • [3] A survey on privacy-preserving federated learning against poisoning attacks
    Xia, Feng
    Cheng, Wenhao
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (10): : 13565 - 13582
  • [4] On the effectiveness of graph matching attacks against privacy-preserving record linkage
    Heng, Youzhe
    Armknecht, Frederik
    Chen, Yanling
    Schnell, Rainer
    [J]. PLOS ONE, 2022, 17 (09):
  • [5] Privacy-preserving generative framework for images against membership inference attacks
    Yang, Ruikang
    Ma, Jianfeng
    Miao, Yinbin
    Ma, Xindi
    [J]. IET COMMUNICATIONS, 2023, 17 (01) : 45 - 62
  • [6] Efficient Privacy-Preserving Federated Learning Against Inference Attacks for IoT
    Miao, Yifeng
    Chen, Siguang
    [J]. 2023 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC, 2023,
  • [7] Privacy-Preserving Network Embedding Against Private Link Inference Attacks
    Han, Xiao
    Yang, Yuncong
    Wang, Leye
    Wu, Junjie
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 847 - 859
  • [8] DefendFL: A Privacy-Preserving Federated Learning Scheme Against Poisoning Attacks
    Liu, Jiao
    Li, Xinghua
    Liu, Ximeng
    Zhang, Haiyan
    Miao, Yinbin
    Deng, Robert H.
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2024,
  • [9] Privacy-Preserving Consensus over a Distributed Network against Eavesdropping Attacks
    Li, Dengke
    Zhou, Han
    Yang, Wen
    [J]. ELECTRONICS, 2019, 8 (09)
  • [10] Analyzing mechanism-based attacks in privacy-preserving data publishing
    Li, Hongtao
    Ma, Jianfeng
    Fu, Shuai
    [J]. OPTIK, 2013, 124 (24): : 6939 - 6945