Securing Timeout Instructions in Web Applications

被引:5
|
作者
Russo, Alejandro [1 ]
Sabelfeld, Andrei [1 ]
机构
[1] Chalmers Univ Technol, Dept Comp Sci & Engn, S-41296 Gothenburg, Sweden
来源
PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM | 2009年
关键词
PROBABILISTIC NONINTERFERENCE; INFORMATION-FLOW; PROGRAMS; LEAKS;
D O I
10.1109/CSF.2009.16
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Timeout mechanisms are a useful feature for web applications. However these mechanisms need to be used with care because, if used as-is, they are vulnerable to timing attacks. This paper focuses on internal timing attacks, a particularly dangerous class of timing attacks, where the attacker needs no access to a clock. In the context of client-side web application security, we present JavaScript-based exploits against the timeout mechanism of the DOM (document object model), supported by the modern browsers. Our experimental findings reveal rather liberal choices for the timeout semantics by different browsers and motivate the need for a general security solution. We propose a foundation for such a solution in the form of a runtime monitor We illustrate for a simple language that, while being more permissive than a typical static analysis, the monitor enforces termination-insensitive noninterference.
引用
收藏
页码:92 / 106
页数:15
相关论文
共 50 条
  • [1] Securing web banking applications
    San Martino, Antonio
    Perramon, Xavier
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2008, 5143 : 314 - 315
  • [2] REMARKS TO THE WEB APPLICATIONS SECURING
    Horovcak, Pavel
    Stehlikova, Beata
    GEOCONFERENCE ON INFORMATICS, GEOINFORMATICS AND REMOTE SENSING - CONFERENCE PROCEEDINGS, VOL I, 2013, : 213 - 218
  • [3] The code for securing web applications
    Li, Mandy
    Susilo, Willy
    Tonien, Joseph
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2019, 40 (04): : 905 - 917
  • [4] Securing Multi-Tiered Web Applications
    Mathew, George
    Du, Xiaojiang
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 505 - 509
  • [5] On the Difficulty of Securing Web Applications using CryptDB
    Akin, Ihsan H.
    Sunar, Berk
    2014 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING (BDCLOUD), 2014, : 745 - 752
  • [6] Securing Web Applications with Predicate Access Control
    Yang, Zhaomo
    Levchenko, Kirill
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 : 541 - 554
  • [7] Securing Password Authentication for Web-based Applications
    Tan, Teik Guan
    Szalachowski, Pawel
    Zhou, Jianying
    2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022), 2022,
  • [8] The Effect of Warnings to Timeout on Child Compliance to Parental Instructions
    Velasquez, Leny D.
    Cathcart, Ana
    Kennedy, Abigail
    Allen, Keith D.
    CHILD & FAMILY BEHAVIOR THERAPY, 2016, 38 (03) : 225 - 244
  • [9] Methods of securing applications for the World Wide Web (WWW)
    Oppliger, Rolf
    Computer Security Journal, 15 (01): : 1 - 10
  • [10] Securing the web
    Baker, Steven
    1997, (15):