Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools
Georg Merzdovnik (SBA Research), Markus Huber (Fachhochschule St. Pölten), Damjan Buhov (SBA Research), Nick Nikiforakis (Stony Brook University), Sebastian Neuner (SBA Research), Martin Schmiedecker (SBA Research), Edgar Weippl (SBA Research)
Online third-party tracking has become a widespread practice on the
Internet, with serious implications for the privacy of users. While
users are often unaware that their online behaviour is being monitored
by omnipresent third-party trackers, trackers continuously expand their
coverage and the methods by which they ensure the longevity of their
tracking identifiers. In this paper, we quantify the effectiveness
of third-party tracker blockers on a large scale. First, we analyze
the architecture of various, state-of-the-art blocking solutions and
discuss the advantages and disadvantages of each method. Second, we
perform a two-part measurement study on the effectiveness of popular
tracker-blocking tools. Our analysis quantifies the protection offered
against trackers present on more than 100,000 popular websites and
10,000 popular Android applications. We provide novel insights into
the ongoing arms race between trackers and developers of blocking
tools, and which tools, under what circumstances, achieve the best
results. Among others, we discover that rule-based browser extensions
outperform learning-based ones, trackers with smaller footprints are
more successful at avoiding being blocked, and CDNs pose a major threat
towards the future of tracker-blocking tools. Overall, the contributions
of this paper advance the field of web privacy by providing not only the
largest, to date, study on the effectiveness of tracker-blocking tools,
but also highlighting the most pressing challenges and privacy issues of
third-party tracking.
Efficient and Flexible Discovery of PHP Application Vulnerabilities
Michael Backes (CISPA, Saarland University & MPI-SWS), Konrad Rieck (TU Braunschweig), Malte Skoruppa (CISPA, Saarland University), Ben Stock (CISPA, Saarland University), Fabian Yamaguchi (TU Braunschweig)
The Web today is a growing universe of pages and applications teeming
with interactive content. The security of such applications is of
the utmost importance, as exploits can have a devastating impact on
personal and economic levels. The number one programming language in
Web applications is PHP, powering more than 80% of the top ten million
websites. Yet it was not designed with security in mind, and, today,
bears a patchwork of fixes and inconsistently designed functions with
often unexpected and hardly predictable behavior that typically yield
a large attack surface. Consequently, it is prone to different types
of vulnerabilities, such as SQL Injection or Cross-Site Scripting. In
this paper, we present an interprocedural analysis technique for PHP
applications based on code property graphs that scales well to large
amounts of code and is highly adaptable in its nature. We implement our
prototype using the latest features of PHP 7, leverage an efficient
graph database to store code property graphs for PHP, and subsequently
identify different types of Web application vulnerabilities by means of
programmable graph traversals. We show the efficacy and the scalability
of our approach by reporting on an analysis of 1,854 popular open-source
projects, comprising almost 80 million lines of code.
Large-scale Analysis & Detection of Authentication Cross-Site Request Forgeries
Avinash Sudhodanan (Fondazione Bruno Kessler), Nicolas Dolgin (SAP Labs France), Roberto Carbone (Fondazione Bruno Kessler), Umberto Morelli (Fondazione Bruno Kessler), Luca Compagna (SAP Labs France), Alessandro Armando (Fondazione Bruno Kessler)
Cross-Site Request Forgery (CSRF) attacks are one of the critical
threats for web applications. In this paper we focus on Auth-CSRF
attacks, i.e. CSRF attacks on web sites’ authentication and identity
management functionalities. We collect several Auth-CSRF attacks
reported in literature, analyze the strategies underlying them and
identify seven testing strategies that can help a manual tester
uncover a large majority of Auth-CSRF attacks. In order to check the
effectiveness of our testing strategies and to estimate the incidence of
Auth-CSRF, we run a large-scale experimental analysis considering 300
Alexa global top web sites belonging to three different rank ranges. The
results of our experimental analysis are alarming. Out of the 300 web
sites we considered, 133 qualified for conducting our experiments and
93 of these suffered from at least one vulnerability enabling Auth-CSRF
attacks (i.e. 70%). We further generalize our testing strategies,
enhance them with the knowledge we acquired during our experiments and
implement them as an extension (namely CSRF-checker) to the open-source
penetration testing tool OWASP ZAP. In the end we conduct further
experiments with CSRF-checker and not only identify more Auth-CSRF
attacks but also save up to 60.9% time with respect to our experiments
without CSRF-checker. Our findings include serious vulnerabilities in
prominent web sites such as Google, eBay etc.
Revisiting Browser Security in the Modern Era: New Data-only Attacks and Defenses
Roman Rogowski (University of North Carolina at Chapel Hill), Micah Morton (University of North Carolina at Chapel Hill), Forrest Li (University of North Carolina at Chapel Hill), Kevin Z. Snow (University of North Carolina at Chapel Hill), Fabian Monrose (University of North Carolina at Chapel Hill), Michalis Polychronakis (Stony Brook University)
The continuous discovery of exploitable vulnerabilities in popular
applications (e.g., web browsers and document viewers), along with their
heightening protections against control flow hijacking, has opened
the door to an often neglected attack strategy—namely, data-only
attacks. In this paper, we demonstrate the practicality of the threat
posed by data-only attacks that harness the power of memory disclosure
vulnerabilities. To do so, we introduce memory cartography, a technique
that simplifies the construction of data-only attacks in a reliable
manner. Specifically, we show how an adversary can use a provided
memory mapping primitive to navigate through process memory at runtime,
and safely reach security-critical data that can then be modified at
will. We demonstrate this capability by using our cross-platform memory
cartography framework implementation to construct data-only exploits
against Internet Explorer and Chrome. The outcome of these exploits
ranges from simple HTTP cookie leakage, to the alteration of the same
origin policy for targeted domains, which enables the cross-origin
execution of arbitrary script code.
The ease with which we can undermine the security of modern browsers
stems from the fact that although isolation policies (such as the same
origin policy) are enforced at the script level, these policies are
not well reflected in the underlying sandbox process models used for
compartmentalization. This gap exists because the complex demands of
today’s web functionality make the goal of enforcing the same origin
policy through process isolation a difficult one to realize in practice,
especially when backward compatibility is a priority (e.g., for support
of cross-origin iframes). While fixing the underlying problems likely
requires a major refactoring of the security architecture of modern
browsers (in the long term), we explore several defenses, including
global variable randomization, that can limit the power of the attacks
presented herein.