Security Implications of Using Third-Party Resources in the World Wide Web

被引:0
|
作者
Podins, Karlis [1 ]
Lavrenovs, Arturs [1 ]
机构
[1] Univ Latvia, Fac Comp, Riga, Latvia
关键词
third-party resources; CSP; privacy; security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Modern web pages have nothing in common with the static connotation coming from the word "page" - it is a dynamic unique experience created by active content and executed within browser, just-in-time assembled from various resources hosted on many different domains. Active content increases attack surface naturally exposing users to many novel threats. A popular security advice has been to deploy active content blocker plugins like NoScript, unfortunately they are not capable to effectively stop the attacks. Content Security Policy (CSP) can be effective against these attacks, but we demonstrate how poor decisions made by website administrators or external resource hosters can render CSP ineffective. As a practical contribution, we have scanned Alexa Top Million web pages for insecure CSP configuration and conducted a follow up scan one year later to observe the changes. Initially only 2% of those web pages were observed to use CSP but in the follow-up the percentage more than doubled. We have found a substantial number of web pages with too loose CSP rules, about 5% of websites that have CSP still enable determined attacker to host malicious content on commercial external resources while fulfilling the CSP rule when exploiting Cross-Site Scripting vulnerability. We also provide a model for the problem domain, formalization of user and domain models, and preferred user security policy.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing
    Polinsky, Isaac
    Datta, Pubali
    Bates, Adam
    Enck, William
    PROCEEDINGS OF THE 26TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2021, 2021, : 175 - 186
  • [22] World Wide Web resources
    Cho, V
    ANNALS OF TOURISM RESEARCH, 1998, 25 (02) : 518 - 521
  • [23] Guidebooks and maps for traveling the world of third-party payers
    Brownlow, Charles B.
    OPTOMETRY-JOURNAL OF THE AMERICAN OPTOMETRIC ASSOCIATION, 2009, 80 (04) : 211 - 211
  • [24] A First Look at Android Apps' Third-Party Resources Loading
    Qayyum, Hina
    Salman, Muhammad
    Sentana, I. Wayan Budi
    Duc Linh Giang Nguyen
    Ikram, Muhammad
    Tyson, Gareth
    Kaafar, Mohamed Ali
    NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 193 - 213
  • [25] THE IMPLICATIONS OF THIRD-PARTY CUSTOMER COMPLAINING FOR ADVERTISING EFFORTS
    Cronin, J. Joseph, Jr.
    Fox, Gavin L.
    JOURNAL OF ADVERTISING, 2010, 39 (02) : 21 - 33
  • [26] Security and the World Wide Web
    Thuraisingham, B
    TWENTY-SECOND ANNUAL INTERNATIONAL COMPUTER SOFTWARE & APPLICATIONS CONFERENCE - PROCEEDINGS, 1998, : 260 - 260
  • [27] World wide web security
    Lipp, P
    ADVANCED SECURITY TECHNOLOGIES IN NETWORKING, 2001, 178 : 169 - 182
  • [28] Preclerkship Medical Students' Use of Third-Party Learning Resources
    Lawrence, Emily C. N.
    Dine, C. Jessica
    Kogan, Jennifer R.
    JAMA NETWORK OPEN, 2023, 6 (12) : E2345971
  • [29] A Payment Model of Mobile Phone based on Third-party Security
    Xu, Yong
    Liu, Xueyan
    Yao, Ruiying
    ICMECG: 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2009, : 400 - +
  • [30] Optimizing Product Improvement Spending with Third-Party Security Consultants
    Matthews, Bronwen
    IEEE SECURITY & PRIVACY, 2012, 10 (01) : 91 - 93