CSCE 790 – Secure Database Systems

Download Report

Transcript CSCE 790 – Secure Database Systems

CSCE 201
Web Browser Security
Fall 2015
Web Evolution

Past: Human usage
– HTTP
– Static Web pages (HTML)

Current: Human and some automated usage
– Interactive Web pages
– Web Services (WSDL, SOAP, SAML)
– Semantic Web (RDF, OWL, RuleML, Web
databases)
– XML technology (data exchange, data representation)

Future: Semantic Web Services
CSCE 201 - Farkas
2
ARE THE EXISTING SECURITY
MECHANISMS SUFFICIENT TO
PROVIDE DATA AND APPLICATION SECURITY OF
THE NEXT GENERATION WEB?
CSCE 201 - Farkas
3
Information Assurance
Fraud
Information hiding
Privacy
Protocol Analysis
Access control
Applications
Data provenance
Semantic web security
Data mining
Security
Biometrics
Trust
Computer epidemic
Policy making
Encryption
Anonymity
Inference Control
CSCE 201 - Farkas
Negotiation
Formal models
4
Web Browser
Software with simple role:
 Connect to a web address
 Fetch and display content from that address
 Send data from a user to that address
CSCE 522 - Farkas
5
Security Issues for Browsers
 Often connect to many addresses instead of only



the address show in address bar
Fetching data have to access many locations to
obtain pictures, audio or linked content.
Browser can be malicious or can be corrupted to
have malicious functionality
Many browsers support add-ins to add new feature
but these add-ins can include malicious code
CSCE 522 - Farkas
6
Security Issues for Browsers
 Data display involve many commands that control



rendering, positioning, motion, layering and even
invisibility
Browser can access any data on user’s computer, it
generally run with the same privileges as the user
Browsers connect users to outside networks, but
few users can monitor what is transmitted
Browser’s effect is immediate and transitory
CSCE 522 - Farkas
7
Browser Attacks
There are 3 attack vectors:
 Target the operating system so it will obstruct the
browser’s correct and secure functioning
 Target the browser or its component, add-ons or
plug-ins, so the browser’s activity is altered
 Intercept or modify communication to or from the
browser
CSCE 522 - Farkas
8
Internet Attacks

Download browser code
 Privacy attack
 Web site attack during surfing
 Email
CSCE 201 - Farkas
9
Download browser code

JavaScript, Java, ActiveX
Internet
HTML document
With JavaScript
Web Server
CSCE 201 - Farkas
Download
HTML document
With JavaScript
Run JavaScript
User’s computer
10
JavaScript

Not for standalone applications -- Resides
inside HTML documents
 Interpreted into machine understandable
code
 Can be downloaded automatically
– Cannot read, write, create, delete, or list files
– Has no networking capabilities
– Can: capture and send user information
CSCE 201 - Farkas
11
Java
Complete programming language –
standalone applications
 Java applets: downloaded with HTML
 Can perform processing

– May harm computer

Defense: sandbox
 Signed vs. unsigned Java applets
CSCE 201 - Farkas
12
ActiveX

Rules defining how applications under the
Windows OS should share information
 ActiveX controls (ad-ons):
– Specific ways of implementing ActiveX
– Can be activated through scripting languages or
by HTML commands

Can perform functions similar to Java
applets but directly access OS
 Signed vs. unsigned
CSCE 201 - Farkas
13
Privacy Attacks

Cookies: Web site to track whether a user
has previously visited the site
– User specific information, stored on the user’s
computer
– First-party cookie vs. third-party cookie
– Can reveal browsing habits of the individuals

Adware: delivers unsolicitated advertising
content
– Pop-up windows
CSCE 201 - Farkas
14
Attacks while surfing

Safe surfing? Passive surfing?
 Redirecting web traffic:
– Typing mistakes
– Attacker: registering “wrong” URLs

Drive-by downloads
– Use scripting to download malicious content
– Spreading at an alarming rate
CSCE 201 - Farkas
15
Internet Defenses

Popup blocker
 Browser settings, e.g., IE Web browser:
– Configure your browser’s security and privacy
–
–
–
–
settings
Keep your browser updated
Sign up for alerts
Be cautious when installing plug-ins
Install security plug-ins
CSCE 201 - Farkas
16
Next Class

Application Security
 M. Mimoso, XcodeGhost Malware Stirring
Up More Trouble,
https://threatpost.com/xcodeghost-malwarestirring-up-more-trouble/114778/
CSCE 201 - Farkas
17