Clickjacking Attacks and Defenses.

Slides:



Advertisements
Similar presentations
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems © 2002, Predictive Systems.
Advertisements

Protecting Browser State from Web Privacy Attacks Collin Jackson, Andrew Bortz, Dan Boneh, John Mitchell Stanford University.
Presented by Vaibhav Rastogi. Current browsers try to separate host system from Web Websites evolved into web applications Lot of private data on the.
Chapter 11 Designing the User Interface
Using PeopleSoft’s User Productivity Kit (UPK)
Microsoft Dynamics® SL
Lin-Shung Huang, Alex Moshchuk, Helen Wang, Stuart Schechter, and Collin Jackson Carnegie Mellon, Microsoft Research USENIX Security 2012 Clickjacking:
USABILITY & ACCESSIBILITY IN WEB CONFERENCING TOOLS: A SIDE-BY-SIDE COMPARISON Accessing Higher Ground, 2009.
Benchmark and Java Applet Test Scenario Presentation Outline Introduction to Benchmark Testing Procedure to create the test Benchmark Playback Results.
ABUSING BROWSER ADDRESS BAR FOR FUN AND PROFIT - AN EMPIRICAL INVESTIGATION OF ADD-ON CROSS SITE SCRIPTING ATTACKS Presenter: Jialong Zhang.
Intermediate Level Course. Text Format The text styles, bold, italics, underlining, superscript and subscript, can be easily added to selected text. Text.
Ch. 6 Web Page Design – Absolute Positioning, Image Maps, and Navigation Bars Mr. Ursone.
Polymorphic blending attacks Prahlad Fogla et al USENIX 2006 Presented By Himanshu Pagey.
Clickjacking: Attacks and Defenses Lin-Shung Huang, Alexander Moshchuk, Helen J. Wang, Stuart Schechter, and Collin Jackson Carnegie Mellon University.
Usable Security (Part 1 – Oct. 30/07) Dr. Kirstie Hawkey Content primarily from Teaching Usable Privacy and Security: A guide for instructors (
A graphical user interface (GUI) is a pictorial interface to a program. A good GUI can make programs easier to use by providing them with a consistent.
Chapter 7 UNDERSTANDING AND DESIGNING FORMS. Input Forms: Content and Organization Need for forms Event analysis and forms Relationship between input.
Creating Web Page Forms. Objectives Describe how Web forms can interact with a server-based program Insert a form into a Web page Create and format a.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Interaction Styles Interface Widgets. What are Interaction Styles?  A Collection of interface objects and associated techniques from which an interaction.
EXCEL PART1. Objectives  Understand spreadsheet software  Tour the Excel 2010 window  Understand formulas  Enter labels and values and use the Sum.
1 Web Testing CIS 376 Bruce R. Maxim UM-Dearborn.
Phu H. Phung Chalmers University of Technology JSTools’ 12 June 13, 2012, Beijing, China Joint work with Lieven Desmet (KU Leuven)
Designing for Disabled Users.  p?vid=35 p?vid=35.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
XP Tutorial 6New Perspectives on Creating Web Pages with HTML, XHTML, and XML 1 Creating Web Page Forms Designing a Product Registration Form Tutorial.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
Visual-Similarity-Based Phishing Detection Eric Medvet, Engin Kirda, Christopher Kruegel SecureComm 2008 Sep.
KAIST Web Wallet: Preventing Phishing Attacks by Revealing User Intentions Min Wu, Robert C. Miller and Greg Little Symposium On Usable Privacy and Security.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
14 Chapter 11: Designing the User Interface. 14 Systems Analysis and Design in a Changing World, 3rd Edition 2 Identifying and Classifying Inputs and.
Badvertisements: Stealthy Click-Fraud with Unwitting Accessories Mona Gandhi Markus Jakobsson Jacob Ratkiewicz Indiana University at Bloomington Presented.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 6 Dynamic Documents With JavaScript.
ADDITIONAL GUIDELINES. Source: Wroblewski, L (2008) Provide Clear path to completion.
1 Usability and accessibility of educational web sites Nigel Bevan University of York UK eTEN Tenuta support action.
ASP.NET.. ASP.NET Environment ASP.NET is Microsoft's programming framework that enables the development of Web applications and services. It is an easy.
Securing Embedded User Interfaces: Android and Beyond Franziska Roesner and Tadayoshi Kohno University of Washington Mohamed Grissa A presentation of USENIX.
An Empirical Study of Visual Security Cues to Prevent the SSLstripping Attack Dongwan Shin and Rodrigo Lopes In Proc. 27 th Annual Computer Security Applications.
User Interface Toolkit Mechanisms For Securing Interface Elements Franziska Roesner, James Fogarty, Tadayoshi Kohno Computer Science & Engineering DUB.
2011/11/1 1 Long Lu, Wenke Lee College of Computing Georgia Inst. of Technology Roberto Perdisci Dept. of Computer Science University of Georgia.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
USER DRIVEN ACCESS CONTROL: RETHINKING PERMISSION GRANTING IN MODERN OPERATING SYSTEM Presentation by: Manik Challana Presented at : IEEE Symposium on.
 Whether using paper forms or forms on the web, forms are used for gathering information. User enter information into designated areas, or fields. Forms.
WEB ACCESSIBILITY. WHAT IS IT? Web accessibility means that people with disabilities can use the Web. Web accessibility encompasses all disabilities that.
Introduction to Javascript. What HTML Can & Can Not Do HTML Can HTML Can Display text Display text Display images Display images Display even animated.
GAZELLE THE MULTI-PRINCIPAL OS CONSTRUCTION OF THE GAZELLE WEB BROWSER.
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks Collin Jackson et. all Presented by Roy Ford.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Introducing XLink and XPointer ©NIITeXtensible Markup Language/Lesson 10/Slide 1 of 23 Objectives In this lesson, you will learn to: * Identify the types.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Section 508 Refresh WCAG 2.0 A and AA Information & Comparison CB Averitt – Deque Systems.
Easy WP Guide V2.6 for WordPress 3.8. easywpguide.com Adding Tags within your Post Adding Tags whilst editing your Post, will automatically assign those.
Dr. Ahmet Cengizhan Dirican BIL 374 Internet Technologies 6. Dynamic Documents With JavaScript.
William H. Bowers – Requirements Torres 9.
Adapted from  2004 Prentice Hall, Inc. All rights reserved. Clickjacking.
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
Jacking Drishti Wali Prashant Kumar. UI Redress Attack  Clickjacking also known as "UI redress attack or User Interface redress attack", is a malicious.
“What the is That? Deception and Countermeasures in the Android User Interface” Presented by Luke Moors.
Microsoft Excel Illustrated Introductory Workbooks and Preparing them for the Web Managing.
Chapter 6 : User interface design
Prototyping.
Security Engineering.
Cross-Site Request Forgeries: Exploitation and Prevention
Strengthening Password-based Authentication
Web Design and Development
Motivation and Problem Statement
Lesson 2 Prototyping.
Introduction to Internet Worm
Security and JavaScript
Presentation transcript:

Clickjacking Attacks and Defenses

Background Clickjacking is a malicious technique of tricking a Web user into clicking on something different to what the user perceives they are clicking on. Get Free IPad Like A clickjacking site contains at least two

Existing Clickjacking Attacks Compromising target display integrity Compromising pointer integrity Compromising temporal integrity Three ways of forcing user into issing input commands

Compromising target display integrity Get Free IPad Hiding the target element Opacity value and Z-index vale Decoy un-clickable http://robertnyman.com/css3/pointer-events/pointer-events.html Partial overlays Cover receipt and amount Cropping Crop the target element to show a piece of the element Like COVER No overlapping

Compromising Pointer integrity CursorJacking Display a fake cursor Hide the default cursor http://koto.github.com/blog-kotowicz-net- examples/cursorjacking/ Strokejacking Blinking cursor Invisible sensitive element Visible fake input field

Compromising Temporal integrity Manipulate UI element after the user decided to click, but before the actual click occurs. Previous two sections manipulated visual context trick user into sending input to wrong UI Manipulate UI element after the user decided to click, before the actual click Double Click

EXISITING anti-clickjacking defense User Confirmation Degrades user experience UI Randomization Not robust Opacity Overlay Policy Too strong Framebusting Some application need to be embedded Can be evaded 1.Facebook 2. Randomize UI layout.It’s hard for attacker to predict the location of the button Express checkout dialogAsk user to keep clicking until successuflly guessing the location 4. Javascript code guarantee top-level document

EXISITING anti-clickjacking defense Visibility Detection on Click Can only address to hiding element strategy UI delay for cross-origin interactions User experience No method to address to point integrity attacks Allow rendering transparent frames, block events on these elements The length of the UI delay is clearly a tradeoff beteen the user experience penalty and protection from timing attacks There is no reason for a benign application to expect users to click a transparent element

New Attack Variants #1 Attack Technique: Cursor spoofing Attack Success: 43%

New Attack Variants #2 Attack Technique: Popup Window Attack Success: 47% Framebusting authorzie

New Attack Variants #3 Attack Technique: Cursor Spoofing + Fast- paced Clicking Attack Success: 98% Play the game with a facked cursor t Control user’s attention The game envorgage users to clock buttons as fast as poosible and the buttons aare shown at random location. Later point in the game, a like button will apear in the real curson;s position, it is highly possble user will clict it because users attention is on other buttons

InContext Defense Design Goals Does not require user prompts Provides point integrity protection Supports target elements that require arbitrary third-party embedding Does not break existing sites

InContext Defense Ensuring Visual Integrity Find the Sensitive Element Application indicate which UI element is sensitive Dynamic OS-level screenshot comparison Determine whether the sensitive element looks different in the page Static reference bitmap The browser draws the sensitive element on a blank surface No animated contents No good How about automated content?

InContext Defense Ensuring visual integrity of pointer •  Remove cursor customization -  Attack success: 43% -> 16%

InContext Defense Ensuring visual integrity of pointer •  Freeze screen around target on pointer entry -  Attack success (margin=20px): 4% Use animation to distract user from

InContext Defense • Mute the speaker when a user interacts with sensitive elements -  Attack success: 43% -  Attack success (Mute + Freeezing): 2% Freezing M=20px

InContext Defense Ensuring visual integrity of pointer •  Lightbox effect around target on pointer entry -  Attack success: 43% -  Attack success ( Lightbox + Freezing + Mute): 2%

InContext Defense No programmatic cross-origin keyboard focus changes To stop strokejacking attacks, once the sensitive UI element acquires keyboard focus, InContext disallows programmatic changes of keyboard focus to other origins.

InContext Defense Ensuring Temporal Integrity UI delay after pointer entry Point re-entry on a newly visible sensitive element When a sensitive UI element first appears or is moved to a location where it will overlap with the current location of the pointer, user needs to re-entry Padding area around sensitive element

Evaluation Method Recruit people from Amazon to do tests Total of 3521 participants, 2064 of which are valid participants The evaluation results are reliable. Only evaluate three attacks, not large-scale.

Comparison Measurement The USENIX paper provides more attacking scenarios and defense cases. The AsiaCCS paper presents a first, large-scale attempt to demonstrate that clickjacking is prevalent and serious. Deployment Both are deployed in browser. ClickIDS is a plugin, InContext can be implemented as a plugin. Introduce New Attacks? The USENIX paper introduces three new attacks.

Comparison Defense Mechanism InContext is more Complete (Pointer, Cropping, strokejacking) InContext only address to elements labeled by application itself as sensitive. Less user experience penalty Evaluation USENIX paper’s authors recruit people from Amazon to evaluate InContext’ effectiveness. More accurate. But only test a few attacks The AsiaCCS uses tools to simulate users’ behaviors to evaluate ClickIDS’s effectiveness in large scale. Large scale, but not accurate. This method will introduce FP. Only clickable events and overlapping

Conclusiton The paper discussed current clickjacking techniques and existing anti-clickjacking defenses The paper proposed three new attack variants that can evade current defenses The evaluation results show that our attacks are highly effective (success rates 43% to 98%) The paper proposed InContext defense mechanism, which be can very effective against clickjacking