Tamper-Resistant LikeJacking Protection

被引:0
|
作者
Johns, Martin [1 ]
Lekies, Sebastian [1 ]
机构
[1] SAP Secur Res, Karlsruhe, Germany
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The ClickJacking variant LikeJacking specifically targets Web widgets that offer seamless integration of third party services, such as social sharing facilities. The standard defense against ClickJacking is preventing framing completely or allowing framing only in trusted contexts. These measures cannot be taken in the case of LikeJacking, due to the widgets' inherent requirement to be available to arbitrary Web applications. In this paper, we report on advances in implementing LikeJacking protection that takes the specific needs of such widgets into account and is compatible with current browsers. Our technique is based on three pillars: A JavaScript-driven visibility check, a secure in-browser communication protocol, and a reliable method to validate the integrity of essential DOM properties and APIs. To study our protection mechanism's performance characteristics and interoperability with productive Web code, we applied it to 635 real-world Web pages. The evaluation's results show that our method performs well even for large, non-trivial DOM structures and is applicable without requiring changes for the majority of the social sharing widgets used by the tested Web applications.
引用
收藏
页码:265 / 285
页数:21
相关论文
共 50 条
  • [1] License protection with a tamper-resistant token
    Chong, CN
    Ren, B
    Doumen, J
    Etalle, S
    Hartel, PH
    Corin, R
    [J]. INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 223 - 237
  • [2] TAMPER-RESISTANT BUT NOT IMPOSSIBLE
    MCLEARN, D
    [J]. AMERICAN JOURNAL OF NURSING, 1985, 85 (03) : 244 - +
  • [3] Tamper-resistant biometric IDs
    Kirovski, D
    Jojic, N
    Jancke, G
    [J]. ISSE 2004 - SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 160 - 175
  • [4] Tamper-resistant cryptographic hardware
    Fujino, Takeshi
    Kubota, Takaya
    Shiozaki, Mitsuru
    [J]. IEICE ELECTRONICS EXPRESS, 2017, 14 (02): : 1 - 13
  • [5] TAMPER-RESISTANT PACKAGING - IS IT REALLY
    LOCKHART, HE
    RICHMOND, M
    SNEDEN, J
    [J]. PACKAGE ENGINEERING, 1983, 28 (07): : 96 - &
  • [6] Tamper-resistant whole program partitioning
    Zhang, T
    Pande, S
    Valverde, A
    [J]. ACM SIGPLAN NOTICES, 2003, 38 (07) : 209 - 219
  • [7] Tamper-resistant ubiquitous data management
    Bouganim, L
    Ngoc, FD
    Pucheral, P
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2005, 20 (02): : 147 - 158
  • [8] The Research of Website Tamper-resistant Technology
    Qi Tao
    Wang Bo
    Zhao Sujuan
    [J]. ADVANCES IN APPLIED SCIENCES AND MANUFACTURING, PTS 1 AND 2, 2014, 850-851 : 475 - +
  • [9] A Tamper-Resistant Programming Language System
    Heimbigner, Dennis
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (02) : 194 - 206
  • [10] Probing attacks on tamper-resistant devices
    Handschuh, H
    Paillier, P
    Stern, J
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS, 1999, 1717 : 303 - 315