326,781 research outputs found
Deterministic Browser
Timing attacks have been a continuous threat to users' privacy in modern
browsers. To mitigate such attacks, existing approaches, such as Tor Browser
and Fermata, add jitters to the browser clock so that an attacker cannot
accurately measure an event. However, such defenses only raise the bar for an
attacker but do not fundamentally mitigate timing attacks, i.e., it just takes
longer than previous to launch a timing attack. In this paper, we propose a
novel approach, called deterministic browser, which can provably prevent timing
attacks in modern browsers. Borrowing from Physics, we introduce several
concepts, such as an observer and a reference frame. Specifically, a snippet of
JavaScript, i.e., an observer in JavaScript reference frame, will always obtain
the same, fixed timing information so that timing attacks are prevented; at
contrast, a user, i.e., an oracle observer, will perceive the JavaScript
differently and do not experience the performance slowdown. We have implemented
a prototype called DeterFox and our evaluation shows that the prototype can
defend against browser-related timing attacks
XSS-FP: Browser Fingerprinting using HTML Parser Quirks
There are many scenarios in which inferring the type of a client browser is
desirable, for instance to fight against session stealing. This is known as
browser fingerprinting. This paper presents and evaluates a novel
fingerprinting technique to determine the exact nature (browser type and
version, eg Firefox 15) of a web-browser, exploiting HTML parser quirks
exercised through XSS. Our experiments show that the exact version of a web
browser can be determined with 71% of accuracy, and that only 6 tests are
sufficient to quickly determine the exact family a web browser belongs to
Browser Feature Usage on the Modern Web
Modern web browsers are incredibly complex, with millions of lines of code
and over one thousand JavaScript functions and properties available to website
authors. This work investigates how these browser features are used on the
modern, open web. We find that JavaScript features differ wildly in popularity,
with over 50% of provided features never used in the Alexa 10k.
We also look at how popular ad and tracking blockers change the distribution
of features used by sites, and identify a set of approximately 10% of features
that are disproportionately blocked (prevented from executing by these
extensions at least 90% of the time they are used). We additionally find that
in the presence of these blockers, over 83% of available features are executed
on less than 1% of the most popular 10,000 websites.
We additionally measure a variety of aspects of browser feature usage on the
web, including how complex sites have become in terms of feature usage, how the
length of time a browser feature has been in the browser relates to its usage
on the web, and how many security vulnerabilities have been associated with
related browser features
Evolving web-based test automation into agile business specifications
Usually, test automation scripts for a web application directly mirror the actions that the tester carries out in the browser, but they tend to be verbose and repetitive, making them expensive to maintain and ineffective in an agile setting. Our research has focussed on providing tool-support for business-level, example-based specifications that are mapped to the browser level for automatic verification. We provide refactoring support for the evolution of existing browser-level tests into business-level specifications. As resulting business rule tables may be incomplete, redundant or contradictory, our tool provides feedback on coverage
Analyzing Android Browser Apps for file:// Vulnerabilities
Securing browsers in mobile devices is very challenging, because these
browser apps usually provide browsing services to other apps in the same
device. A malicious app installed in a device can potentially obtain sensitive
information through a browser app. In this paper, we identify four types of
attacks in Android, collectively known as FileCross, that exploits the
vulnerable file:// to obtain users' private files, such as cookies, bookmarks,
and browsing histories. We design an automated system to dynamically test 115
browser apps collected from Google Play and find that 64 of them are vulnerable
to the attacks. Among them are the popular Firefox, Baidu and Maxthon browsers,
and the more application-specific ones, including UC Browser HD for tablet
users, Wikipedia Browser, and Kids Safe Browser. A detailed analysis of these
browsers further shows that 26 browsers (23%) expose their browsing interfaces
unintentionally. In response to our reports, the developers concerned promptly
patched their browsers by forbidding file:// access to private file zones,
disabling JavaScript execution in file:// URLs, or even blocking external
file:// URLs. We employ the same system to validate the ten patches received
from the developers and find one still failing to block the vulnerability.Comment: The paper has been accepted by ISC'14 as a regular paper (see
https://daoyuan14.github.io/). This is a Technical Report version for
referenc
On the digital forensic analysis of the Firefox browser via recovery of SQLite artifacts from unallocated space
A technique and supporting tool for the recovery of browsing activity (both stored and deleted) from current and recent versions of the Firefox web-browser is presented. The generality of the technique is discussed: It is applicable to any software that uses the popular SQLite embedded database engine such as the Apple Safari web-browser and many Android apps
- …
