The Library
DOMtegrity : ensuring web page integrity against malicious browser extensions
Tools
Toreini, Ehsan, Shahandashti, Siamak F., Mehrnezhad, Maryam and Hao, Feng (2019) DOMtegrity : ensuring web page integrity against malicious browser extensions. International Journal of Information Security, 18 . pp. 801-814. doi:10.1007/s10207-019-00442-1 ISSN 1615-5262.
|
PDF
WRAP-DOMtegrity-ensuring-web-page-integrity-browser-Hao-2019.pdf - Published Version - Requires a PDF viewer. Available under License Creative Commons Attribution 4.0. Download (1067Kb) | Preview |
|
PDF
WRAP-DOMtegrity-ensuring-web-page-malicious-extensions-Hao-2019 (1).pdf - Accepted Version Embargoed item. Restricted access to Repository staff only - Requires a PDF viewer. Download (1806Kb) |
Official URL: https://doi.org/10.1007/s10207-019-00442-1
Abstract
In this paper, we address an unsolved problem in the real world: how to ensure the integrity of the web content in a browser in the presence of malicious browser extensions? The problem of exposing confidential user credentials to malicious extensions has been widely understood, which has prompted major banks to deploy two-factor authentication. However, the importance of the “integrity” of the web content has received little attention. We implement two attacks on real-world online banking websites and show that ignoring the “integrity” of the web content can fundamentally defeat two-factor solutions. To address this problem, we propose a cryptographic protocol called DOMtegrity to ensure the end-to-end integrity of the DOM structure of a web page from delivering at a web server to the rendering of the page in the user’s browser. DOMtegrity is the first solution that protects DOM integrity without modifying the browser architecture or requiring extra hardware. It works by exploiting subtle yet important differences between browser extensions and in-line JavaScript code. We show how DOMtegrity prevents the earlier attacks and a whole range of man-in-the-browser attacks. We conduct extensive experiments on more than 14,000 real-world extensions to evaluate the effectiveness of DOMtegrity.
Item Type: | Journal Article | ||||||||
---|---|---|---|---|---|---|---|---|---|
Divisions: | Faculty of Science, Engineering and Medicine > Science > Computer Science | ||||||||
Journal or Publication Title: | International Journal of Information Security | ||||||||
Publisher: | Springer | ||||||||
ISSN: | 1615-5262 | ||||||||
Official Date: | December 2019 | ||||||||
Dates: |
|
||||||||
Volume: | 18 | ||||||||
Page Range: | pp. 801-814 | ||||||||
DOI: | 10.1007/s10207-019-00442-1 | ||||||||
Status: | Peer Reviewed | ||||||||
Publication Status: | Published | ||||||||
Reuse Statement (publisher, data, author rights): | This is a post-peer-review, pre-copyedit version of an article published in International Journal of Information Security. The final authenticated version is available online at:https://doi.org/10.1007/s10207-019-00442-1 | ||||||||
Access rights to Published version: | Open Access (Creative Commons) | ||||||||
Date of first compliant deposit: | 5 June 2019 | ||||||||
Date of first compliant Open Access: | 28 June 2019 | ||||||||
Related URLs: |
Request changes or add full text files to a record
Repository staff actions (login required)
View Item |
Downloads
Downloads per month over past year