Securing Interaction for Sites, Apps and Extensions in the Browser Brad Miller J. D. Tygar.

Slides:



Advertisements
Similar presentations
On the Design of a Web Browser: Lessons learned from Operating Systems Kapil Singh and Wenke Lee Georgia Institute of Technology Web 2.0 Security and Privacy.
Advertisements

RBAC and HIPAA Security Uday O. Ali Pabrai, CHSS, SCNA Chief Executive, HIPAA Academy.
Protecting Browser State from Web Privacy Attacks Collin Jackson, Andrew Bortz, Dan Boneh, John Mitchell Stanford University.
Online Privacy A Module of the CYC Course – Personal Security
Presented by Vaibhav Rastogi. Current browsers try to separate host system from Web Websites evolved into web applications Lot of private data on the.
Parameter Tampering. Attacking the Ecommerce Shopping Cart In the above image we see that a user who wants to purchase a Television visits an online Store.
Georgios Kontaxis, Michalis Polychronakis Angelos D. Keromytis, Evangelos P. Markatos Siddhant Ujjain (2009cs10219) Deepak Sharma (2009cs10185)
An Evaluation of the Google Chrome Extension Security Architecture
CC3.12 Lecture 12 Erdal KOSE Based of Prof. Ziegler Lectures.
The Most Dangerous Code in the Browser Stefan Heule, Devon Rifkin, Alejandro Russo, Deian Stefan Stanford University, Chalmers University of Technology.
Adjusting your Facebook Privacy Settings Privacy, please!
Ajay Joshi. Function  Simple opening screen with large icons for each ‘grouping’ (Efficient)  Opens through a web browser (Efficient)  First time you.
Microsoft Passport Waldemar Swiercz.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
Accounting & Billing System for the WEB Centre GDP 19 Donna Crawford (dc899) Chris O’Neill (ckjon101) Amit Shah (ams401) David Newman (drn101) Supervisor.
Elisa Bertino Dept. of Computer Science University of Milano Page 1 Author-X Secure and selective access and flexible distribution mechanisms for XML documents.
Be able to plan e-commerce strategies. E-commerce strategy An e-commerce strategy encapsulates all the decisions which need to be made when setting up.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
How To Protect Your Privacy and Avoid Identity Theft Online.
“If you build it, they will come.”. Virtual Business  There is much more that goes into a virtual business than just building the web site.  You will.
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
1 Subspace: Secure Cross Domain Communication for Web Mashups Collin Jackson and Helen J. Wang Mamadou H. Diallo.
Content Management Systems A content management system is software that loads on your web host’s server and manages all content on your web site dynamically.
Norman SecureSurf Protect your users when surfing the Internet.
Tracking Services for ANY websites and web applications Zhu Xiong CSE 403 LCO.
Presented by…. Group 2 1. Programming language 2Introduction.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Web Migration Project Update for ATC April 28, 2009.
JavaScript, Fourth Edition
Working with Cookies Managing Data in a Web Site Using JavaScript Cookies* *Check and comply with the current legislation regarding handling cookies.
Created by, Author Name, School Name—State FLUENCY WITH INFORMATION TECNOLOGY Skills, Concepts, and Capabilities.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Economic Development Maps and Apps for State and Local Governments Lindsay King Nikki Golding Chris Buscaglia.
Georgios Kontaxis‡, Michalis Polychronakis‡, Angelos D. Keromytis‡, and Evangelos P.Markatos* ‡Columbia University and *FORTH-ICS USENIX-SEC (August, 2012)
Building Secure Web Applications With ASP.Net MVC.
By Sean Rose and Erik Hazzard.  SQL Injection is a technique that exploits security weaknesses of the database layer of an application in order to gain.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Workshop site:
Sears Privacy Policy & Security information Shaina Lacher.
Customer Hub Protect Your Content. What We’ll Be Talking About Customer Hub is a powerful content management system that is fully integrated with Infusionsoft.
Protecting Browsers from Extension Vulnerabilities Paper by: Adam Barth, Adrienne Porter Felt, Prateek Saxena at University of California, Berkeley and.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
1 Isolating Web Programs in Modern Browser Architectures CS6204: Cloud Environment Spring 2011.
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
Structure P6. Structure It is important to consider the structure of the website and of each page within it. At all times customer considerations should.
Society & Computers PowerPoint
Cloud Environment Spring  Microsoft Research Browser (2009)  Multi-Principal Environment with Browser OS  Next Step Towards Secure Browser 
Windows Vista Configuration MCTS : Internet Explorer 7.0.
TYLER GROUP
SlideSet #20: Input Validation and Cross-site Scripting Attacks (XSS) SY306 Web and Databases for Cyber Operations.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
Cosc 5/4765 Database security. Database Databases have moved from internal use only to externally accessible. –Organizations store vast quantities of.
Facebook privacy policy
IT Security Awareness Day October 19, 2016
Setting and Upload Products
Security Management: Successes and Failures
"Our vision is to be earth's most customer-centric company; to build a place where people can come to find and discover anything they might want to buy.
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
What is a Blog? short for Weblog journal on a website
Shavonne Henry, Nikia Clarke, David Heymann, Brandon Knight
Latest Updates on BlackHawk Mines Music : Privacy Policy
Microsoft FrontPage 2003 Illustrated Complete
Cross-Site Request Forgeries: Exploitation and Prevention
Unit 27 Web Server Scripting Extended Diploma in ICT
Riding Someone Else’s Wave with CSRF
Google Privacy Policy Karen Tao.
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Presentation transcript:

Securing Interaction for Sites, Apps and Extensions in the Browser Brad Miller J. D. Tygar

Sharing Information in the Cloud How will we share information between apps? Web interface dominant Need for robust cross-domain mechanisms Many advantages Less control Less flexibility

Server AServer B Cross-Domain XHRpostMessageContent Security Policy Origin A In Browser Origin B In Browser Same Origin Policy Evolved Security Mechanisms Server AServer B Same Origin Policy Cross-Domain XHRpostMessageContent Security Policy Origin A In Browser Origin B In Browser These features are not enough Workarounds will emerge

The Chrome Approach Chrome merges “apps” and “extensions” – Web apps can be installed from a web store Users grant apps privileges at install time – Domain level granularity – Cookies, script injection & cross-domain requests

Fundamental Modifications – Designs app/extension, writes manifest – Chooses to install app, approves manifest – Unable to participate Site designer should help mediate access – Best understanding of data – Best incentive to protect data Leverage real-world meaning of data – Policies users can understand UserApp DeveloperSite Designer

DOM Node Tags Privacy tags: protect read access – address, financial, medical, photo/video, etc. Integrity tags: protect write access – Designed on a custom basis per site = node tagged as “financial” = inherited “financial” tag from parent Underlying DOM Menubar Summary Transactions Website Menubar Individual Account Transactions Summary of Accounts

Restricting Scripts 2 Types of scripts – Requested by site during normal execution – Inserted by browser on behalf of an extension/app 4 Types of protection Requested by site Inserted by browser PrivacyIntegrity

Determining Policies User sets policy for extensions at install time Site designer sets policy for web scripts Site makes recommendation for extensions Negotiation resolves any conflicts Requested by site Inserted by browser PrivacyIntegrity

Policy Negotiation Negotiation occurs first time a user visits a site Can be per extension or across all extensions correspondence photos/videos medical financial correspondence photos/videos Site RecommendationUser Settings Are you sure you want to let extensions access your medical and financial data on this site?

Example: Photo Editing Privacy tags restrict access to photos Cross-Domain XHR more cumbersome – Would require support from Facebook – Not flexible enough for long term success Facebook Photo Editor Denied Allowed Denied Contact Info Wall Posts Photos

Example: Identity Theft Shopping Website Bank Website Evil or Vulnerable Installed App Credit Card Info Purchase Record Purchase Record Script injection Credit Card Info Script Injection Tag Protection

Improvements over status quo Usability – Choices are more natural for humans Better policies – Privacy tags leverage semantic meaning of data – Integrity tags allow finer granularity in page access Better incentives – Party with most knowledge and stake plays a role

Future Work & Open Questions Handling DOM updates – Approved script writes new nodes into DOM – What tags should be assigned to new nodes? Privacy tag set – Fixed set could be restrictive – Custom set harder to work with