Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3372297.3417271acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

Fill in the Blanks: Empirical Analysis of the Privacy Threats of Browser Form Autofill

Published: 02 November 2020 Publication History

Abstract

Providing functionality that streamlines the more tedious aspects of website interaction is of paramount importance to browsers as it can significantly improve the overall user experience. Browsers' autofill functionality exemplifies this goal, as it alleviates the burden of repetitively typing the same information across websites. At the same time, however, it also presents a significant privacy risk due to the inherent disparity between the browser's interpretation of a given web page and what users can visually perceive. In this paper we present the first, to our knowledge, comprehensive exploration of the privacy threats of autofill functionality. We first develop a series of new techniques for concealing the presence of form elements that allow us to obtain sensitive user information while bypassing existing browser defenses. Alarmingly, our large-scale study in the Alexa top 100K reveals the widespread use of such deceptive techniques for stealthily obtaining user-identifying information, as they are present in at least 5.8% of the forms that are autofilled by Chrome. Subsequently, our in-depth investigation of browsers' autofill functionality reveals a series of flaws and idiosyncrasies, which we exploit through a series of novel attack vectors that target specific aspects of browsers' behavior. By chaining these together we are able to demonstrate a novel invasive side-channel attack that exploits browser's autofill preview functionality for inferring sensitive information even when users choose to not utilize autofill. This attack affects all major Chromium-based browsers and allows attackers to probe users' autofill profiles for over a hundred thousand candidate values (e.g., credit card and phone numbers). Overall, while the preview mode is intended as a protective measure for enabling more informed decisions, ultimately it creates a new avenue of exposure that circumvents a user's choice to not divulge their information. In light of our findings, we have disclosed our techniques to the affected vendors, and have also created a Chrome extension that can prevent our attacks and mitigate this threat until our countermeasures are incorporated into browsers.

Supplementary Material

MOV File (Copy of CCS2020_fpx180_Xu Lin - Andrew Diehl.mov)
Presentation video

References

[1]
Google chrome privacy whitepaper. https://www.google.com/chrome/privacy/whitepaper.html.
[2]
Google developers - help users checkout faster with autofill. https://developers.google.com/web/updates/2015/06/checkout-faster-with-autofill.
[3]
Google developers - help users checkout faster with autofill. https://developers.google.com/web/updates/2015/06/checkout-faster-with-autofill.
[4]
Mozilla firefox features. https://wiki.mozilla.org/Firefox/Features/Form_Autofill#Feature_Availability.
[5]
Preview demo: Desktop, 100k credit card values. https://vimeo.com/412514626/fb485212ad.
[6]
Preview demo: Laptop, 100k email address values. https://vimeo.com/412447440/e753a2cf4c.
[7]
Preview demo: Multiple autofill accounts. https://vimeo.com/414161536/c3a9e00f1c.
[8]
The guardian - browser autofill used to steal personal details in new phishing attack, 2017. https://www.theguardian.com/technology/2017/jan/10/browser-autofill-used-to-steal-personal-details-in-new-phising-attack-chrome-safari.
[9]
HTML Living Standard - Last Updated 26 February 2020. https://html.spec.whatwg.org/multipage/form-control-infrastructure.html#attr-fe-autocomplete, 2020.
[10]
Http archive - state of the web, 2020. https://httparchive.org/reports/state-of-the-web.
[11]
Mailchimp - troubleshooting the embedded signup form, 2020. https://mailchimp.com/help/troubleshooting-the-embedded-signup-form/.
[12]
Maxmind db, 2020. https://www.maxmind.com/en/geoip2-city.
[13]
Nyc department of planning, 2020. https://www1.nyc.gov/site/planning/data-maps/open-data.page#snd.
[14]
Gunes Acar, Steven Englehardt, and Arvind Narayanan. No boundaries: data exfiltration by third parties embedded on web pages. In Proceedings of the 20th Privacy Enhancing Technologies Symposium (PETS). Sciendo, July 2020.
[15]
Devdatta Akhawe and Adrienne Porter Felt. Alice in warningland: A large-scale field study of browser security warning effectiveness. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13), pages 257--272, 2013.
[16]
Mohamed Alsharnouby, Furkan Alaca, and Sonia Chiasson. Why phishing still works: User strategies for combating phishing attacks. International Journal of Human-Computer Studies, 82:69--82, 2015.
[17]
Reuben Binns, Jun Zhao, Max Van Kleek, and Nigel Shadbolt. Measuring third-party tracker power across web and mobile. ACM Transactions on Internet Technology (TOIT), 18(4):1--22, 2018.
[18]
Tomasz Bujlow, Valent'in Carela-Espa nol, Josep Sole-Pareta, and Pere Barlet-Ros. A survey on web tracking: Mechanisms, implications, and defenses. Proceedings of the IEEE, 105(8):1476--1510, 2017.
[19]
Yinzhi Cao, Song Li, Erik Wijmans, et al. (cross-) browser fingerprinting via os and hardware level features. In NDSS, 2017.
[20]
Manolis Chatzimpyrros, Konstantinos Solomos, and Sotiris Ioannidis. You shall not register! detecting privacy leaks across registration forms. In Computer Security, pages 91--104. Springer, 2019.
[21]
Graham Cluley. Hackers' malicious script skimmed credit card details off robert dyas website, 2020. https://www.grahamcluley.com/hackers-robert-dyas/.
[22]
Linda Di Geronimo, Larissa Braz, Enrico Fregnan, Fabio Palomba, and Alberto Bacchelli. Ui dark patterns and where to find them: A study on mobile applications and user perception. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, CHI '20, 2020.
[23]
Steven Englehardt and Arvind Narayanan. Online tracking: A 1-million-site measurement and analysis. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pages 1388--1401, 2016.
[24]
Gunes Acar. Freedom To Tinker - No boundaries for user identities: Web trackers exploit browser login managers. https://freedom-to-tinker.com/2017/12/27/no-boundaries-for-user-identities-web-trackers-exploit-browser-login-managers/, 2017.
[25]
Brendan Harkness. Anatomy of a credit card, 2020. https://www.creditcardinsider.com/learn/anatomy-of-a-credit-card/.
[26]
Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, and Vern Paxson. Hulk: Eliciting malicious behavior in browser extensions. In 23rd USENIX Security Symposium (USENIX Security 14), pages 641--654, 2014.
[27]
Soroush Karami, Panagiotis Ilia, Konstantinos Solomos, and Jason Polakis. Carnus: Exploring the privacy threats of browser extension fingerprinting. In 27th Annual Network and Distributed System Security Symposium. The Internet Society, 2020.
[28]
Pierre Laperdrix, Walter Rudametkin, and Benoit Baudry. Beauty and the beast: Diverting modern web browsers to build unique browser fingerprints. In 2016 IEEE Symposium on Security and Privacy (SP), pages 878--894. IEEE, 2016.
[29]
Lindsay Liedke. Wpforms blog - online form statistics & facts for 2020, 2020. https://wpforms.com/online-form-statistics-facts/#form-conversions.
[30]
Meng Luo, Oleksii Starov, Nima Honarmand, and Nick Nikiforakis. Hindsight: Understanding the evolution of ui vulnerabilities in mobile browsers. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pages 149--162, 2017.
[31]
Arunesh Mathur, Gunes Acar, Michael J Friedman, Elena Lucherini, Jonathan Mayer, Marshini Chetty, and Arvind Narayanan. Dark patterns at scale: Findings from a crawl of 11k shopping websites. Proceedings of the ACM on Human-Computer Interaction, 3(CSCW):1--32, 2019.
[32]
Sören Preibusch, Kat Krol, and Alastair R Beresford. The privacy economics of voluntary over-disclosure in web forms. In The Economics of Information Security and Privacy, pages 183--209. Springer, 2013.
[33]
Mirjam Seckler, Silvia Heinz, Javier A Bargas-Avila, Klaus Opwis, and Alexandre N Tuch. Designing usable web forms: empirical evaluation of web form improvement guidelines. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 1275--1284, 2014.
[34]
Anisha Sekar. Stolen credit card numbers, 2015. https://www.nerdwallet.com/blog/credit-cards/stolen-credit-card-numbers/.
[35]
David Silver, Suman Jana, Dan Boneh, Eric Chen, and Collin Jackson. Password managers: Attacks and defenses. In Proceedings of the 23rd USENIX Conference on Security Symposium (USENIX Security 14), SEC'14, USA, 2014. USENIX Association.
[36]
Suphannee Sivakorn, Jason Polakis, and Angelos D. Keromytis. I am robot: (deep) learning to break semantic image captchas. In Proceedings of the 1st IEEE European Symposium on Security and Privacy, EuroSP '16, 2016.
[37]
Emily Stark. The urlephant in the room. 2019.
[38]
Oleksii Starov, Phillipa Gill, and Nick Nikiforakis. Are you sure you want to contact us? quantifying the leakage of pii via website contact forms. Proceedings on Privacy Enhancing Technologies, 2016(1):20--33, 2016.
[39]
Oleksii Starov and Nick Nikiforakis. Xhound: Quantifying the fingerprintability of browser extensions. In 2017 IEEE Symposium on Security and Privacy (SP), pages 941--956. IEEE, 2017.
[40]
Steven Englehardt. Freedom To Tinker - No boundaries: Exfiltration of personal data by session-replay scripts. https://freedom-to-tinker.com/2017/11/15/no-boundaries-exfiltration-of-personal-data-by-session-replay-scripts/, 2017.
[41]
Ben Stock and Martin Johns. Protecting users against xss-based password manager abuse. In Proceedings of the 9th ACM symposium on Information, computer and communications security, pages 183--194, 2014.
[42]
Christopher Thompson, Martin Shelton, Emily Stark, Maximilian Walker, Emily Schechter, and Adrienne Porter Felt. The web's identity crisis: understanding the effectiveness of website identity indicators. In 28th USENIX Security Symposium USENIX Security 19), pages 1715--1732, 2019.
[43]
Erik Trickel, Oleksii Starov, Alexandros Kapravelos, Nick Nikiforakis, and Adam Doupé. Everyone is different: client-side diversification for defending against extension fingerprinting. In 28th USENIX Security Symposium (USENIX Security 19), pages 1679--1696, 2019.
[44]
Tobias Urban, Martin Degeling, Thorsten Holz, and Norbert Pohlmann. Beyond the front page: Measuring third party dynamics in the field. In Proceedings of The Web Conference 2020, pages 1275--1286, 2020.
[45]
Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, and Thorsten Holz. (un) informed consent: Studying gdpr consent notices in the field. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pages 973--990, 2019.
[46]
Mingxue Zhang, Wei Meng, Sangho Lee, Byoungyoung Lee, and Xinyu Xing. All your clicks belong to me: investigating click interception on the web. In 28th USENIX Security Symposium (USENIX Security 19), pages 941--957, 2019.
[47]
Binbin Zhao, Haiqin Weng, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He, and Reheem Beyah. Towards evaluating the security of real-world deployed image captchas. In Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, pages 85--96, 2018.

Cited By

View all
  • (2024)APIMiner: Identifying Web Application APIs Based on Web Page States Similarity AnalysisElectronics10.3390/electronics1306111213:6(1112)Online publication date: 18-Mar-2024
  • (2024)SACL: Siamese Adaptive Contrastive Learning for Recommendation2024 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN60899.2024.10651202(1-8)Online publication date: 30-Jun-2024
  • (2024)IPSRM: An intent perceived sequential recommendation modelJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2024.10220636:9(102206)Online publication date: Nov-2024
  • Show More Cited By

Index Terms

  1. Fill in the Blanks: Empirical Analysis of the Privacy Threats of Browser Form Autofill

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security
    October 2020
    2180 pages
    ISBN:9781450370899
    DOI:10.1145/3372297
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 November 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. autocomplete
    2. data exfiltration
    3. form autofill
    4. web browsers

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CCS '20
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)370
    • Downloads (Last 6 weeks)44
    Reflects downloads up to 24 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)APIMiner: Identifying Web Application APIs Based on Web Page States Similarity AnalysisElectronics10.3390/electronics1306111213:6(1112)Online publication date: 18-Mar-2024
    • (2024)SACL: Siamese Adaptive Contrastive Learning for Recommendation2024 International Joint Conference on Neural Networks (IJCNN)10.1109/IJCNN60899.2024.10651202(1-8)Online publication date: 30-Jun-2024
    • (2024)IPSRM: An intent perceived sequential recommendation modelJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2024.10220636:9(102206)Online publication date: Nov-2024
    • (2024)Understanding the Digital Frontier: Examining Privacy and Data Security in Desktop Web BrowsersDigital Technologies and Applications10.1007/978-3-031-68650-4_14(138-147)Online publication date: 17-Aug-2024
    • (2023)When Push Comes to Shove: Empirical Analysis of Web Push Implementations in the WildProceedings of the 39th Annual Computer Security Applications Conference10.1145/3627106.3627186(44-55)Online publication date: 4-Dec-2023
    • (2023)Designing Alternative Form-Autocompletion Tools to Enhance Privacy Decision-making and Prevent Unintended DisclosureACM Transactions on Computer-Human Interaction10.1145/361036630:6(1-42)Online publication date: 25-Sep-2023
    • (2023)Mutual Wasserstein Discrepancy Minimization for Sequential RecommendationProceedings of the ACM Web Conference 202310.1145/3543507.3583529(1375-1385)Online publication date: 30-Apr-2023
    • (2023)Graph Collaborative Signals Denoising and Augmentation for RecommendationProceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval10.1145/3539618.3591994(2037-2041)Online publication date: 19-Jul-2023
    • (2023)Fashion Faux Pas: Implicit Stylistic Fingerprints for Bypassing Browsers' Anti-Fingerprinting Defenses2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179437(987-1004)Online publication date: May-2023
    • (2023)Accessibility Design Issues beyond the Standards of Government e-Services for People with Low VisionInternational Journal of Human–Computer Interaction10.1080/10447318.2023.224160940:19(5827-5844)Online publication date: 6-Aug-2023
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media