Proceedings of the 13th ACM Conference on Computer and Communications Security 2006
DOI: 10.1145/1180405.1180434
|View full text |Cite
|
Sign up to set email alerts
|

Puppetnets

Abstract: Most of the recent work on Web security focuses on preventing attacks that directly harm the browser's host machine and user. In this paper we attempt to quantify the threat of browsers being indirectly misused for attacking third parties. Specifically, we look at how the existing Web infrastructure (e.g., the languages, protocols, and security policies) can be exploited by malicious Web sites to remotely instruct browsers to orchestrate actions including denial of service attacks, worm propagation and reconna… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2007
2007
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 49 publications
(1 citation statement)
references
References 30 publications
0
1
0
Order By: Relevance
“…A malicious adversary cannot sign webpages on behalf of the website under attack and thus cannot claim these sites as its origin. Unfortunately, even if all broadcast content was properly assigned to a restricted web origin, many attacks would still be possible via "blind" CSRF or PuppetNet attacks [Lam et al 2006]. These attacks can cause considerable damage, even if the same-origin principle is upheld, by the sheer virtue of being able to access the Internet using somebody else's computer.…”
Section: Countermeasuresmentioning
confidence: 99%
“…A malicious adversary cannot sign webpages on behalf of the website under attack and thus cannot claim these sites as its origin. Unfortunately, even if all broadcast content was properly assigned to a restricted web origin, many attacks would still be possible via "blind" CSRF or PuppetNet attacks [Lam et al 2006]. These attacks can cause considerable damage, even if the same-origin principle is upheld, by the sheer virtue of being able to access the Internet using somebody else's computer.…”
Section: Countermeasuresmentioning
confidence: 99%