Security Implications of Using Third-Party Resources in the World Wide Web

被引:0
|
作者
Podins, Karlis [1 ]
Lavrenovs, Arturs [1 ]
机构
[1] Univ Latvia, Fac Comp, Riga, Latvia
关键词
third-party resources; CSP; privacy; security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Modern web pages have nothing in common with the static connotation coming from the word "page" - it is a dynamic unique experience created by active content and executed within browser, just-in-time assembled from various resources hosted on many different domains. Active content increases attack surface naturally exposing users to many novel threats. A popular security advice has been to deploy active content blocker plugins like NoScript, unfortunately they are not capable to effectively stop the attacks. Content Security Policy (CSP) can be effective against these attacks, but we demonstrate how poor decisions made by website administrators or external resource hosters can render CSP ineffective. As a practical contribution, we have scanned Alexa Top Million web pages for insecure CSP configuration and conducted a follow up scan one year later to observe the changes. Initially only 2% of those web pages were observed to use CSP but in the follow-up the percentage more than doubled. We have found a substantial number of web pages with too loose CSP rules, about 5% of websites that have CSP still enable determined attacker to host malicious content on commercial external resources while fulfilling the CSP rule when exploiting Cross-Site Scripting vulnerability. We also provide a model for the problem domain, formalization of user and domain models, and preferred user security policy.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Security Implications of Third-Party Accelerators
    Olson, Lena E.
    Sethumadhavan, Simha
    Hill, Mark D.
    IEEE COMPUTER ARCHITECTURE LETTERS, 2016, 15 (01) : 50 - 53
  • [2] Integrating third-party applications and information systems into the World Wide Web
    Chiu, CM
    Chen, RS
    Bieber, M
    ASSOCIATION FOR INFORMATION SYSTEMS PROCEEDINGS OF THE AMERICAS CONFERENCE ON INFORMATION SYSTEMS, 1998, : 935 - 937
  • [3] A Study of Third-party Resources Loading on Web
    Ikram, Muhammad
    Masood, Rahat
    Tyson, Gareth
    Kaafar, Mohamed Ali
    Ensafi, Roya
    arXiv, 2022,
  • [4] Building sustainable collections of free third-party Web resources
    Ryan, M
    PORTAL-LIBRARIES AND THE ACADEMY, 2002, 2 (03) : 485 - 487
  • [5] Building sustainable collections of free third-party Web resources
    Sellers, C
    JOURNAL OF ACADEMIC LIBRARIANSHIP, 2001, 27 (06): : 483 - 483
  • [6] The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading
    Ikram, Muhammad
    Masood, Rahat
    Tyson, Gareth
    Kaafar, Mohamed Ali
    Loizon, Noha
    Ensafi, Roya
    WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019), 2019, : 2851 - 2857
  • [7] Building sustainable collections of free third-party web resources.
    Sylvia, M
    LIBRARY JOURNAL, 2001, 126 (17) : 116 - 116
  • [8] Using third-party purchasing to push third-party logistics
    Long, JS
    Zhao, J
    THIRD WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS: GLOBAL BUSINESS INTERFACE, 2004, : 400 - 404
  • [9] The Evolution of Third-Party Web Tracking
    Wambach, Tim
    Braeunlich, Katharina
    INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP 2016), 2017, 691 : 130 - 147
  • [10] Security Assurance Guidance for Third-Party IP
    Brent Sherman
    Mike Borza
    Brian Rosenberg
    Charles Qi
    Journal of Hardware and Systems Security, 2017, 1 (1) : 38 - 55