Proceedings of the 26th International Conference on World Wide Web 2017
DOI: 10.1145/3038912.3052686
|View full text |Cite
|
Sign up to set email alerts
|

Security Challenges in an Increasingly Tangled Web

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
28
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(31 citation statements)
references
References 16 publications
3
28
0
Order By: Relevance
“…Unfortunately, no in-depth analysis about the adoption and the understanding of SRI (by web developers) has been performed so far. Most existing works [25,39] focus on modest-size datasets of webpages, focus on one snapshot only, and only look at the basic statistics, e.g., they do not study the main factors behind the adoption/usage of SRI. Our work lls this gap (i) by conducting the rst large-scale longitudinal study on the adoption/usage of SRI on the Web, and (ii) by surveying web developers regarding their understanding and usage of SRI.…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, no in-depth analysis about the adoption and the understanding of SRI (by web developers) has been performed so far. Most existing works [25,39] focus on modest-size datasets of webpages, focus on one snapshot only, and only look at the basic statistics, e.g., they do not study the main factors behind the adoption/usage of SRI. Our work lls this gap (i) by conducting the rst large-scale longitudinal study on the adoption/usage of SRI on the Web, and (ii) by surveying web developers regarding their understanding and usage of SRI.…”
Section: Introductionmentioning
confidence: 99%
“…Assuming that no other whitelisted source suffers from an open redirect vulnerability, a developer needs to only whitelist full URLs. This may, however, be brittle when considering that third parties often add more scripts [10,11], for which URLs can change, which would violate the CSP. Hence, we overall find that the prevalence of script gadgets on many widely used hosts severely impairs CSP's ability to mitigate XSS attacks.…”
Section: Discussionmentioning
confidence: 99%
“…We obtain the resource dependencies of the Alexa top-200K websites' main pages 1 using the method described in [28]. This Chromium-based Headless [12] crawler renders a given website and tracks resource dependencies by recording network requests sent to third-party domains.…”
Section: Data Collectionmentioning
confidence: 99%
“…Our study is far broader, and sheds light on dependency chains across many different types of websites rather than simply inspecting advertisements. More related is Kumar et al [28], who recently characterized websites' resource dependencies on third-party services. In-line with our work, they found that dependency chains are widespread.…”
Section: Related Workmentioning
confidence: 99%