Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3133956.3133966acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security

Published: 30 October 2017 Publication History

Abstract

Modern web browsers have accrued an incredibly broad set of features since being invented for hypermedia dissemination in 1990. Many of these features benefit users by enabling new types of web applications. However, some features also bring risk to users' privacy and security, whether through implementation error, unexpected composition, or unintended use. Currently there is no general methodology for weighing these costs and benefits. Restricting access to only the features which are necessary for delivering desired functionality on a given website would allow users to enforce the principle of lease privilege on use of the myriad APIs present in the modern web browser.
However, security benefits gained by increasing restrictions must be balanced against the risk of breaking existing websites. This work addresses this problem with a methodology for weighing the costs and benefits of giving websites default access to each browser feature. We model the benefit as the number of websites that require the feature for some user-visible benefit, and the cost as the number of CVEs, lines of code, and academic attacks related to the functionality. We then apply this methodology to 74 Web API standards implemented in modern browsers. We find that allowing websites default access to large parts of the Web API poses significant security and privacy risks, with little corresponding benefit.
We also introduce a configurable browser extension that allows users to selectively restrict access to low-benefit, high-risk features on a per site basis. We evaluated our extension with two hardened browser configurations, and found that blocking 15 of the 74 standards avoids 52.0% of code paths related to previous CVEs, and 50.0% of implementation code identified by our metric, without affecting the functionality of 94.7% of measured websites.

Supplemental Material

MP4 File

References

[1]
Adblock plus. https://adblockplus.org/. [Online; accessed 16-October-2015].
[2]
Cve-2011-2363. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2363, 2011. [Online; accessed 11-August-2016].
[3]
Cve-2012-4171. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4171, 2012. [Online; accessed 11-August-2016].
[4]
Cve-2013-2031. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2031, 2013. [Online; accessed 11-August-2016].
[5]
Chromium blink mailing list discussion. https://groups.google.com/a/chromium.org/forum/#!topic/blink-dev/1wWhVoKWztY, 2014. [Online; accessed 15-February-2016].
[6]
Android developer's guide: System permissions. https://developer.android.com/guide/topics/security/permissions.html, 2015. [Online; accessed 17-February-2016].
[7]
Cve-2015-0818. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818, 2015. [Online; accessed 11-August-2016].
[8]
Chromium blink web features guidelines. https://dev.chromium.org/blink#new-features, 2016. [Online; accessed 15-February-2016].
[9]
High resolution time level 2. https://www.w3.org/TR/hr-time-2/, 2016. [Online; accessed 11-November-2016].
[10]
Web workers. https://www.w3.org/TR/workers/, 2016. [Online; accessed 13-August-2016].
[11]
Webrtc 1.0: Real-time communication between browsers. https://www.w3.org/TR/webrtc/, 2016. [Online; accessed 11-August-2016].
[12]
Acar, G., Eubank, C., Englehardt, S., Juarez, M., Narayanan, A., and Diaz, C. The web never forgets: Persistent tracking mechanisms in the wild. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (2014), ACM, pp. 674--689.
[13]
Acar, G., Juarez, M., Nikiforakis, N., Diaz, C., Gürses, S., Piessens, F., and Preneel, B. Fpdetective: dusting the web for fingerprinters. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (2013), ACM, pp. 1129--1140.
[14]
Adenot, P., Wilson, C., and Rogers, C. Web audio api. http://www.w3.org/TR/webaudio/, 2013.
[15]
Alaca, F., and van Oorschot, P. Device fingerprinting for augmenting web authentication: Classification and analysis of methods. In Proceedings of the 32th Annual Computer Security Applications Conference (2016).
[16]
Andrysco, M., Kohlbrenner, D., Mowery, K., Jhala, R., Lerner, S., and Shacham, H. On subnormal floating point and abnormal timing. In 2015 IEEE Symposium on Security and Privacy (2015), IEEE, pp. 623--639.
[17]
Au, K. W. Y., Zhou, Y. F., Huang, Z., Gill, P., and Lie, D. Short paper: a look at smartphone permission models. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (2011), ACM, pp. 63--68.
[18]
Black Duck Software Inc. The chromium (google chrome) open source project on open hub. https://www.openhub.net/p/chrome/analyses/latest/code_history, 2015. [Online; accessed 16-October-2015].
[19]
Blue, V. You say advertising, i say block that malware. http://www.engadget.com/2016/01/08/you-say-advertising-i-say-block-that-malware/, 2016. [Online; accessed 15-February-2016].
[20]
Bryant, M. The noscript misnomer - why should i trust vjs.zendcdn.net? https://thehackerblog.com/the-noscript-misnomer-why-should-i-trust-vjs-zendcdn-net/index.html, 2015. [Online; accessed 12-August-2016].
[21]
Cao, Y., Li, S., and Wijmans, E. (Cross-)Browser Fingerprinting via OS and Hardware Level Features. In Proceedings of the Symposium on Networked and Distributed System Security (2017).
[22]
Dahlström, E., Dengler, P., Grasso, A., Lilley, C., McCormack, C., Schepers, D., and Watt, J. Scalable vector graphics (svg) 1.1 (second edition). http://www.w3.org/TR/SVG11/, 2011.
[23]
Das, A., Borisov, N., and Caesar, M. Tracking mobile web users through motion sensors: Attacks and defenses. In Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS) (2016).
[24]
Dingledine, R., Mathewson, N., and Syverson, P. Tor: The second-generation onion router. Tech. rep., DTIC Document, 2004.
[25]
Dorwin, D., Smith, J., Watson, M., and Bateman, A. Encrypted media extensions. http://www.w3.org/TR/encrypted-media/, 2015.
[26]
Englehardt, S., and Narayanan, A. Online tracking: A 1-million-site measurement and analysis. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016), ACM, pp. 1388--1401.
[27]
Fanboy, MonztA, Famlam, and Khrin. Easylist. https://easylist.adblockplus.org/en/. [Online; accessed 16-October-2015].
[28]
Gelernter, N., and Herzberg, A. Cross-site search attacks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (2015), ACM, pp. 1394--1405.
[29]
Google. boringssl - git at google. https://boringssl.googlesource.com/boringssl/, 2016. [Online; accessed 12-November-2016].
[30]
Gras, B., Razavi, K., Bosman, E., Bos, H., and Giuffrida, C. ASLR on the Line: Practical Cache Attacks on the MMU. In Proceedings of the Symposium on Networked and Distributed System Security (2017).
[31]
Gruss, D., Bidner, D., and Mangard, S. Practical memory deduplication attacks in sandboxed javascript. In European Symposium on Research in Computer Security (2015), Springer, pp. 108--122.
[32]
Guarnieri, S., and Livshits, B. Gatekeeper: mostly static enforcement of security and reliability policies for javascript code. In Proceedings of the 18th conference on USENIX security symposium (Berkeley, CA, USA, 2009), SSYM'09, USENIX Association, pp. 151--168.
[33]
Heiderich, M., Frosch, T., and Holz, T. Iceshield: detection and mitigation of malicious websites with a frozen dom. In International Workshop on Recent Advances in Intrusion Detection (2011), Springer, pp. 281--300.
[34]
Ho, G., Boneh, D., Ballard, L., and Provos, N. Tick tock: building browser red pills from timing side channels. In 8th USENIX Workshop on Offensive Technologies (WOOT 14) (2014).
[35]
Kim, H., Lee, S., and Kim, J. Exploring and mitigating privacy threats of html5 geolocation api. In Proceedings of the 30th Annual Computer Security Applications Conference (2014), ACM, pp. 306--315.
[36]
Kostiainen, A. Vibration. http://www.w3.org/TR/vibration/, 2105.
[37]
Kostiainen, A., Oksanen, I., and Hazaël-Massieux, D. Html media capture. http://www.w3.org/TR/html-media-capture/, 2104.
[38]
Kotcher, R., Pei, Y., Jumde, P., and Jackson, C. Cross-origin pixel stealing: timing attacks using css filters. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (2013), ACM, pp. 1055--1062.
[39]
Lamouri, M., and C#239;ceres, M. Screen orientation. http://www.w3.org/TR/screen-orientation/, 2105.
[40]
Laperdrix, P., Rudametkin, W., and Baudry, B. Beauty and the beast: Diverting modern web browsers to build unique browser fingerprints. In 37th IEEE Symposium on Security and Privacy (S&P 2016) (2016).
[41]
Liu, C., White, R. W., and Dumais, S. Understanding web browsing behaviors through weibull analysis of dwell time. In Proceedings of the 33rd international ACM SIGIR conference on Research and development in information retrieval (2010), ACM, pp. 379--386.
[42]
Maone, G. Noscript - javascript/java/flash blocker for a safer firefox experience! https://noscript.net/, 2015. [Online; accessed 08-February-2015].
[43]
Meyerovich, L. A., and Livshits, B. Conscript: Specifying and enforcing fine-grained security policies for javascript in the browser. In 2010 IEEE Symposium on Security and Privacy (2010), IEEE, pp. 481--496.
[44]
Miller, M. S. Google caja. https://developers.google.com/caja/, 2013.
[45]
Mozilla Corporation. Dxr. https://github.com/mozilla/dxr, 2016.
[46]
Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., and Vigna, G. Cookieless monster: Exploring the ecosystem of web-based device fingerprinting. In IEEE Symposium on Security and Privacy (2013).
[47]
Olejnik, L. Stealing sensitive browser data with the W3C Ambient Light Sensor API. https://blog.lukaszolejnik.com/stealing-sensitive-browser-data-with-the-w3c-ambient-light-sensor-api/, 2017.
[48]
Olejnik, L., Acar, G., Castelluccia, C., and Diaz, C. The leaking battery a privacy analysis of the html5 battery status api. Tech. rep., Cryptology ePrint Archive, Report 2015/616, 2015, ht tp://eprint. iacr. org, 2015.
[49]
Oren, Y., Kemerlis, V. P., Sethumadhavan, S., and Keromytis, A. D. The spy in the sandbox: Practical cache attacks in javascript and their implications. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (2015), ACM, pp. 1406--1418.
[50]
Ozment, A., and Schechter, S. E. Milk or wine: does software security improve with age? In Usenix Security (2006).
[51]
Patrizio, A. How forbes inadvertently proved the anti-malware value of ad blockers. http://www.networkworld.com/article/3021113/security/forbes-malware-ad-blocker-advertisements.html, 2016. [Online; accessed 15-February-2016].
[52]
Perry, M., Clark, E., and Murdoch, S. The design and implementation of the tor browser. https://www.torproject.org/projects/torbrowser/design/#fingerprinting-linkability, 2015. [Online; accessed 15-February-2016].
[53]
Shin, Y., Meneely, A., Williams, L., and Osborne, J. A. Evaluating complexity, code churn, and developer activity metrics as indicators of software vulnerabilities. IEEE Transactions on Software Engineering 37, 6 (2011), 772--787.
[54]
Snyder, P., Ansari, L., Taylor, C., and Kanich, C. Browser feature usage on the modern web. In Proceedings of the 2016 Internet Measurement Conference (to appear) (2016).
[55]
Son, S., and Shmatikov, V. The postman always rings twice: Attacking and defending postmessage in html5 websites. In NDSS (2013).
[56]
Stamm, S., Sterne, B., and Markham, G. Reining in the web with content security policy. In Proceedings of the 19th International Conference on World Wide Web (2010), ACM, pp. 921--930.
[57]
Tian, Y., Liu, Y. C., Bhosale, A., Huang, L. S., Tague, P., and Jackson, C. All your screens are belong to us: attacks exploiting the html5 screen sharing api. In 2014 IEEE Symposium on Security and Privacy (2014), IEEE, pp. 34--48.
[58]
Turner, D., and Kostiainen, A. Ambient light events. http://www.w3.org/TR/ambient-light/, 2105.
[59]
Van Goethem, T., Joosen, W., and Nikiforakis, N. The clock is still ticking: Timing attacks in the modern web. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (2015), ACM, pp. 1382--1393.
[60]
Van Goethem, T., Vanhoef, M., Piessens, F., and Joosen, W. Request and conquer: Exposing cross-origin resource size. In Proceedings of the Usenix Security Symposium (2016).
[61]
Web Hypertext Application Technology Working Group (WHATWG). Html living standard. https://html.spec.whatwg.org/, 2015.
[62]
Weissbacher, M., Robertson, W., Kirda, E., Kruegel, C., and Vigna, G. Zigzag: Automatically hardening web applications against client-side validation vulnerabilities. In 24th USENIX Security Symposium (USENIX Security 15) (2015), pp. 737--752.
[63]
Xu, M., Jang, Y., Xing, X., Kim, T., and Lee, W. Ucognito: Private browsing without tears. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (2015), ACM, pp. 438--449.
[64]
Zimmermann, T., Nagappan, N., and Zeller, A. Predicting bugs from history. In Software Evolution. Springer, 2008, pp. 69--88.

Cited By

View all
  • (2024)A Web Browser Plugin for Users' Security AwarenessProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670439(1-7)Online publication date: 30-Jul-2024
  • (2024)Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript BundlesProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690262(2192-2206)Online publication date: 2-Dec-2024
  • (2024)Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic AlignmentProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3680351(1174-1185)Online publication date: 11-Sep-2024
  • Show More Cited By

Index Terms

  1. Most Websites Don't Need to Vibrate: A Cost-Benefit Approach to Improving Browser Security

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security
        October 2017
        2682 pages
        ISBN:9781450349468
        DOI:10.1145/3133956
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 30 October 2017

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. browser security
        2. software security
        3. web security and privacy

        Qualifiers

        • Research-article

        Funding Sources

        Conference

        CCS '17
        Sponsor:

        Acceptance Rates

        CCS '17 Paper Acceptance Rate 151 of 836 submissions, 18%;
        Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

        Upcoming Conference

        CCS '25

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)225
        • Downloads (Last 6 weeks)27
        Reflects downloads up to 12 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)A Web Browser Plugin for Users' Security AwarenessProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670439(1-7)Online publication date: 30-Jul-2024
        • (2024)Unbundle-Rewrite-Rebundle: Runtime Detection and Rewriting of Privacy-Harming Code in JavaScript BundlesProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690262(2192-2206)Online publication date: 2-Dec-2024
        • (2024)Tacoma: Enhanced Browser Fuzzing with Fine-Grained Semantic AlignmentProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3680351(1174-1185)Online publication date: 11-Sep-2024
        • (2023)Pool-partyProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620634(7091-7105)Online publication date: 9-Aug-2023
        • (2023)AnimateDeadProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620549(5575-5591)Online publication date: 9-Aug-2023
        • (2023)MinimalistProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620548(5557-5573)Online publication date: 9-Aug-2023
        • (2023)DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise InjectionProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627191(379-393)Online publication date: 4-Dec-2023
        • (2023)Role Models: Role-based Debloating for Web ApplicationsProceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy10.1145/3577923.3583647(251-262)Online publication date: 24-Apr-2023
        • (2023)"We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery DeploymentsProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623180(3138-3152)Online publication date: 15-Nov-2023
        • (2023)HODOR: Shrinking Attack Surface on Node.js via System Call LimitationProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616609(2800-2814)Online publication date: 15-Nov-2023
        • Show More Cited By

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media