Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3488932.3517416acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article
Open access

SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model

Published: 30 May 2022 Publication History

Abstract

A web visit typically consists of the browser rendering a dynamically generated response that is specifically tailored to the user. This generation of responses based on the currently authenticated user, whose authentication credentials are automatically included via cookies in all (including cross-site) requests, have led to a multitude of issues. Through cross-site leaks (XS-Leaks), an adversary can try to circumvent the same-origin policy and extract information about responses, which in turn can reveal potentially sensitive information about the user. As research on this class of vulnerabilities only recently gained traction, and the attacks affect many different components of the web platform, the intrinsic characteristics and underlying causes remain largely unexplored.
In this paper we present an abstraction of XS-Leaks attacks and introduce an extended formal model that we use to reason about the cause of different leaks and which strategies the various defense mechanisms employ to defend against them. Furthermore, we provide a classification method for current attacks, and, guided by our model, propose a methodology to comprehensively detect new XS-Leak issues, or indicate their absence. Furthermore, we analyze the current defenses and identify gaps that still require further research to provide extensive solutions for sites that rely on cross-site interactions. Finally, we explore how XS-Leak defenses are currently deployed and which challenges website owners are still facing. As a first step towards facilitating the deployment of XS-Leak defenses, we introduce LeakBuster, a dynamic web interface that provides web developers with suggestions based on the insights provided throughout this paper.

References

[1]
Marc Andrysco, David Kohlbrenner, Keaton Mowery, Ranjit Jhala, Sorin Lerner, and Hovav Shacham. 2015. On subnormal floating point and abnormal timing. In 2015 IEEE Symposium on Security and Privacy. IEEE, 623--639.
[2]
Lukasz Anforowicz. 2019. CORB vs side channels. https://docs.google.com/document/d/1kdqstoT1uH5JafGmRXrtKE4yVfjUVmXitjcvJ4tbBvM/edit.
[3]
David Baron. 2002. :visited support allows queries into global history. https://bugzilla.mozilla.org/show_bug.cgi?id=147777.
[4]
Andrew Bortz and Dan Boneh. 2007. Exposing private information by timing web applications. In Proceedings of the 16th international conference on World Wide Web. 621--628.
[5]
Chrome Platform Status. 2021. Feature: Cookies default to SameSite=Lax. https://www.chromestatus.com/feature/5088147346030592.
[6]
Chromium bugs. 2018. Issue 843157: Security: leak cross-window request timing by exhausting connection pool. https://bugs.chromium.org/p/chromium/issues/detail?id=843157.
[7]
Edward W Felten and Michael A Schneider. 2000. Timing attacks on web privacy. In Proceedings of the 7th ACM Conference on Computer and Communications Security. 25--32.
[8]
Gertjan Franken, Tom Van Goethem, and Wouter Joosen. [n.d.]. Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications of EPUB Reading Systems. In 2021 IEEE Symposium on Security and Privacy. IEEE, 247--264.
[9]
Brent Fulgham. 2018. Protecting Against HSTS Abuse. https://webkit.org/blog/8146/protecting-against-hsts-abuse/.
[10]
Nethanel Gelernter and Amir Herzberg. 2015. Cross-site search attacks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1394--1405.
[11]
Luan Herrera. 2018. XS-Searching Google's bug tracker to find out vulnerable source code. https://medium.com/@luanherrera/xs-searching-googles-bug-tracker-to-find-out-vulnerable-source-code-50d8135b7549.
[12]
Luan Herrera. 2021. XS-Leaks in redirect flows. https://docs.google.com/presentation/d/1rlnxXUYHY9CHgCMckZsCGH4VopLo4DYMvAcOltma0og/.
[13]
Artur Janc, Krzysztof Kotowicz, Lukas Weichselbaum, and Roberto Clapis. 2020. Information Leaks via Safari's Intelligent Tracking Prevention. arXiv preprint arXiv:2001.07421 (2020).
[14]
Soroush Karami, Panagiotis Ilia, and Jason Polakis. 2021. Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage. In Network and Distributed System Security Symposium (NDSS).
[15]
Hyungsub Kim, Sangho Lee, and Jong Kim. 2016. Inferring browser activity and status through remote monitoring of storage usage. In Proceedings of the 32nd Annual Conference on Computer Security Applications. 410--421.
[16]
Eiji Kitamura. 2021. Load cross-origin resources without CORP headers using COEP: credentialless. https://developer.chrome.com/blog/coep-credentialless-origin-trial/.
[17]
Amit Klein and Benny Pinkas. 2019. DNS Cache-Based User Tracking. In Network and Distributed System Security Symposium (NDSS).
[18]
Lukas Knittel, Christian Mainka, Marcus Niemietz, Dominik Trevor Noß, and Jörg Schwenk. 2021. XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security.
[19]
David Kohlbrenner and Hovav Shacham. 2017. On the effectiveness of mitigations against floating-point timing channels. In 26th USENIX Security Symposium. 69--81.
[20]
Pierre Laperdrix, Oleksii Starov, Quan Chen, Alexandros Kapravelos, and Nick Nikiforakis. 2021. Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets. In 30th USENIX Security Symposium.
[21]
Stuart Larsen. 2020. Filtering the Crap, Content Security Policy (CSP) Reports. https://csper.io/blog/csp-report-filtering.
[22]
Jiyeon Lee, Hayeon Kim, Junghwan Park, Insik Shin, and Sooel Son. 2018. Pride and prejudice in progressive web apps: Abusing native app-like features in web applications. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 1731--1746.
[23]
Sangho Lee, Hyungsub Kim, and Jong Kim. 2015. Identifying Cross-origin Resource Status Using Application Cache. In Network and Distributed System Security Symposium (NDSS).
[24]
Sebastian Lekies, Ben Stock, Martin Wentzel, and Martin Johns. 2015. The unexpected dangers of dynamic JavaScript. In 24th USENIX Security Symposium. 723--735.
[25]
Ron Masas. 2018. Patched Facebook Vulnerability Could Have Exposed Private Information About You and Your Friends. https://www.imperva.com/blog/facebook-privacy-bug/.
[26]
Ron Masas. 2019. A now-patched vulnerability in the web version of Facebook Messenger allowed any website to expose who you have been messaging with. https://www.imperva.com/blog/mapping-communication-between-facebook-accounts-using-a-browser-based-side-channel-attack/.
[27]
Matt Menke. 2020. Storage Isolation Project. https://docs.google.com/document/d/1V8sFDCEYTXZmwKa_qWUfTVNAuBcPsu6FC0PhqMD6KKQ/.
[28]
Rowan Merewood. 2019. SameSite cookies explained. https://web.dev/samesite-cookies-explained/.
[29]
Mozilla Developer Network. 2021 a. Cross-Origin Opener Policy (COOP). https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Cross-Origin-Opener-Policy.
[30]
Mozilla Developer Network. 2021 b. Cross-Origin Resource Policy (CORP). https://developer.mozilla.org/en-US/docs/Web/HTTP/Cross-Origin_Resource_Policy_(CORP).
[31]
Mozilla Developer Network and Jesse Ruderman. 2020. Same-origin policy. https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy.
[32]
Yossef Oren, Vasileios P Kemerlis, Simha Sethumadhavan, and Angelos D Keromytis. 2015. The spy in the sandbox: Practical cache attacks in javascript and their implications. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1406--1418.
[33]
Charlie Osborne. 2021. Playing Fetch: New XS-Leak exploits browser redirects to break user privacy. https://portswigger.net/daily-swig/playing-fetch-new-xs-leak-exploits-browser-redirects-to-break-user-privacy.
[34]
Charles Reis, Alexander Moshchuk, and Nasko Oskov. 2019. Site isolation: process separation for web sites within the browser. In 28th USENIX Security Symposium. 1661--1678.
[35]
Renwa. 2020. Bypass SameSite Cookies Default to Lax and get CSRF. https://medium.com/@renwa/bypass-samesite-cookies-default-to-lax-and-get-csrf-343ba09b9f2b.
[36]
Iskander Sanchez-Rola, Davide Balzarotti, and Igor Santos. 2019. Bakingtimer: privacy analysis of server-side request processing time. In Proceedings of the 35th Annual Computer Security Applications Conference. 478--488.
[37]
Iskander Sanchez-Rola, Davide Balzarotti, and Igor Santos. 2020. Cookies from the Past: Timing Server-Side Request Processing Code for History Sniffing. ACM Dgital Threats: Research and Practice Journal (DTRAP) (2020).
[38]
Iskander Sanchez-Rola, Igor Santos, and Davide Balzarotti. 2017. Extension breakdown: Security analysis of browsers extension resources control policies. In 26th USENIX Security Symposium. 679--694.
[39]
Roei Schuster, Vitaly Shmatikov, and Eran Tromer. 2017. Beauty and the burst: Remote identification of encrypted video streams. In 26th USENIX Security Symposium. 1357--1374.
[40]
Jörg Schwenk, Marcus Niemietz, and Christian Mainka. 2017. Same-origin policy: Evaluation in modern browsers. In 26th USENIX Security Symposium. 713--727.
[41]
Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, and Yuval Yarom. 2021. Prime Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses. In 30th USENIX Security Symposium.
[42]
Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, and Yuval Yarom. 2019. Robust website fingerprinting through the cache occupancy channel. In 28th USENIX Security Symposium. 639--656.
[43]
Michael Smith, Craig Disselkoen, Shravan Narayan, Fraser Brown, and Deian Stefan. 2018. Browser history re: visited. In 12th USENIX Workshop on Offensive Technologies (WOOT 18).
[44]
Konstantinos Solomos, John Kristoff, Chris Kanich, and Jason Polakis. 2021. Persistent Tracking in Modern Browsers. (2021).
[45]
Dolière Francis Somé. 2019. Empoweb: empowering web applications with browser extensions. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 227--245.
[46]
Manuel Sousa, terjanq, Roberto Clapis, David Dworken, and NDevTK. 2020. XS-Leaks Wiki. https://xsleaks.dev/.
[47]
Cristian-Alexandru Staicu and Michael Pradel. 2019. Leaky images: Targeted privacy attacks in the web. In 28th USENIX Security Symposium. 923--939.
[48]
Oleksii Starov and Nick Nikiforakis. 2017. Xhound: Quantifying the fingerprintability of browser extensions. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 941--956.
[49]
Avinash Sudhodanan, Soheil Khodayari, and Juan Caballero. 2019. Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks. arXiv preprint arXiv:1908.02204(2019).
[50]
Erik Sy, Christian Burkert, Hannes Federrath, and Mathias Fischer. 2018. Tracking users across the web via TLS session resumption. In Proceedings of the 34th Annual Computer Security Applications Conference. 289--299.
[51]
terjanq. 2019. Mass XS-Search using Cache Attack. https://terjanq.github.io/Bug-Bounty/Google/cache-attack-06jd2d2mz2r0/index.html.
[52]
Tom Van Goethem and Wouter Joosen. 2017. One side-channel to bring them all and in the darkness bind them: Associating isolated browsing sessions. In 11th USENIX Workshop on Offensive Technologies (WOOT 17).
[53]
Tom Van Goethem, Wouter Joosen, and Nick Nikiforakis. 2015. The clock is still ticking: Timing attacks in the modern web. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 1382--1393.
[54]
Tom Van Goethem, Christina Pöpper, Wouter Joosen, and Mathy Vanhoef. 2020. Timeless timing attacks: Exploiting concurrency to leak secrets over remote connections. In 29th USENIX Security Symposium. 1985--2002.
[55]
Tom Van Goethem, Mathy Vanhoef, Frank Piessens, and Wouter Joosen. 2016. Request and conquer: Exposing cross-origin resource size. In 25th USENIX Security Symposium. 447--462.
[56]
Pepe Vila and Boris Köpf. 2017. Loophole: Timing attacks on shared event loops in chrome. In 26th USENIX Security Symposium. 849--864.
[57]
WebKit. 2013. Optionally partition cache to prevent using cache for tracking. https://bugs.webkit.org/show_bug.cgi?id=110269 .
[58]
WHATWG. 2021. HTML Living Standard. 4.8.5 The iframe element. https://html.spec.whatwg.org/multipage/iframe-embed-object.html#attr-iframe-name.
[59]
XS-Leaks Wiki. 2020 a. Cache Probing. https://xsleaks.dev/docs/attacks/cache-probing/.
[60]
XS-Leaks Wiki. 2020 b. CORP Leaks. https://xsleaks.dev/docs/attacks/browser-features/corp/.
[61]
XS-Leaks Wiki. 2020 c. Cross-Origin-Opener-Policy. https://xsleaks.dev/docs/defenses/opt-in/coop/.
[62]
XS-Leaks Wiki. 2020 d. Error Events. https://xsleaks.dev/docs/attacks/error-events/.
[63]
XS-Leaks Wiki. 2020 e. Frame Counting. https://xsleaks.dev/docs/attacks/frame-counting/.
[64]
XS-Leaks Wiki. 2020 f. ID Attribute. https://xsleaks.dev/docs/attacks/id-attribute/.
[65]
XS-Leaks Wiki. 2020 g. Navigations. https://xsleaks.dev/docs/attacks/navigations/.
[66]
XS-Leaks Wiki. 2020 h. postMessage Broadcasts. https://xsleaks.dev/docs/attacks/postmessage-broadcasts/.
[67]
XS-Leaks Wiki. 2020 i. Resource Isolation Policy. https://xsleaks.dev/docs/defenses/isolation-policies/resource-isolation/.
[68]
XS-Leaks Wiki. 2020 j. X-Frame-Options and Status Type Detector. https://xsleaks.github.io/xsleaks/examples/x-frame/index.html.

Cited By

View all
  • (2023)Finding All Cross-Site Needles in the DOM Stack: A Comprehensive Methodology for the Automatic XS-Leak Detection in Web BrowsersProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616598(2456-2470)Online publication date: 15-Nov-2023
  • (2023)Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability Detection2023 IEEE Security and Privacy Workshops (SPW)10.1109/SPW59333.2023.00038(371-383)Online publication date: May-2023
  • (2023)The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179311(2744-2760)Online publication date: May-2023

Index Terms

  1. SoK: Exploring Current and Future Research Directions on XS-Leaks through an Extended Formal Model

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        ASIA CCS '22: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security
        May 2022
        1291 pages
        ISBN:9781450391405
        DOI:10.1145/3488932
        This work is licensed under a Creative Commons Attribution International 4.0 License.

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 30 May 2022

        Check for updates

        Author Tags

        1. formal model
        2. same-origin policy
        3. taxonomy
        4. xs-leaks

        Qualifiers

        • Research-article

        Funding Sources

        • Horizon 2020

        Conference

        ASIA CCS '22
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 418 of 2,322 submissions, 18%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)231
        • Downloads (Last 6 weeks)28
        Reflects downloads up to 16 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)Finding All Cross-Site Needles in the DOM Stack: A Comprehensive Methodology for the Automatic XS-Leak Detection in Web BrowsersProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616598(2456-2470)Online publication date: 15-Nov-2023
        • (2023)Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability Detection2023 IEEE Security and Privacy Workshops (SPW)10.1109/SPW59333.2023.00038(371-383)Online publication date: May-2023
        • (2023)The Leaky Web: Automated Discovery of Cross-Site Information Leaks in Browsers and the Web2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179311(2744-2760)Online publication date: May-2023

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media