2019
DOI: 10.1007/978-3-030-29962-0_29
|View full text |Cite
|
Sign up to set email alerts
|

Testing for Integrity Flaws in Web Sessions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…Of particular concern is the vulnerability of JavaScript in supply chain attacks [23,24,25], highlighting de ciencies in verifying the integrity of third-party script content, making JavaScript a potential threat that jeopardizes user security. To enhance the security of government websites, security measures such as Subresource Integrity (SRI) [26] and Content Security Policy (CSP) [27,28,29,30,31,32] become crucial. These measures help mitigate security risks faced by government websites and enhance their resilience against malicious attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Of particular concern is the vulnerability of JavaScript in supply chain attacks [23,24,25], highlighting de ciencies in verifying the integrity of third-party script content, making JavaScript a potential threat that jeopardizes user security. To enhance the security of government websites, security measures such as Subresource Integrity (SRI) [26] and Content Security Policy (CSP) [27,28,29,30,31,32] become crucial. These measures help mitigate security risks faced by government websites and enhance their resilience against malicious attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The deployment of HSTS policy grows in recent years [16,54]. However, HSTS still has security issues due to misconfigurations [42,46,60] and partial adoptions [21,61]. Adversaries can use these weak practices to bypass the protection of HSTS policy [59], which also applies to SCC attacks.…”
Section: Bypassing Https Security Policiesmentioning
confidence: 99%
“…By measuring and exploring the adoption, works show that HSTS policy is still messed in configuration [42,46,54,60] and can be bypassed [59]. Some variants of stripping attacks appear, when HSTS is partially deployed [22,42,61], or in the help of malicious DNS servers [13,33]. However, these stripping attacks are noticeable to users now, because of browser security indicators, which show connection security and the authenticity of the remote web server.…”
Section: Related Workmentioning
confidence: 99%
“…The notion of related-domain attacker was first introduced by Bortz, Barth and Czeskis [10]. Their work identified the security risks posed by related do- [16]. Related-domain attackers have also been considered in formal web security models, again in the context of web sessions [14].…”
Section: Related Workmentioning
confidence: 99%