Proceedings 2019 Network and Distributed System Security Symposium 2019
DOI: 10.14722/ndss.2019.23149
|View full text |Cite
|
Sign up to set email alerts
|

Time Does Not Heal All Wounds: A Longitudinal Analysis of Security-Mechanism Support in Mobile Browsers

Abstract: Recent market share statistics show that mobile device traffic has overtaken that of traditional desktop computers. Users spend an increasing amount of time on their smartphones and tablets, while the web continues to be the platform of choice for delivering new applications to users. In this environment, it is necessary for web applications to utilize all the tools at their disposal to protect mobile users against popular web application attacks. In this paper, we perform the first study of the support of pop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 23 publications
(23 citation statements)
references
References 22 publications
1
17
0
Order By: Relevance
“…In particular, XFO just supports three types of policies: DENY prevents all framing, SAMEORIGIN restricts framing to the same origin as the framed page, and ALLOW-FROM u restricts framing to a single URL u. Note that ALLOW-FROM is not even supported by all browsers (in particular Chrome and Safari), thus making XFO particularly problematic [22]. CSP, instead, may be used to allow framing from a list of arbitrarily many Web origins specified through source expressions.…”
Section: Csp For Framing Controlmentioning
confidence: 99%
“…In particular, XFO just supports three types of policies: DENY prevents all framing, SAMEORIGIN restricts framing to the same origin as the framed page, and ALLOW-FROM u restricts framing to a single URL u. Note that ALLOW-FROM is not even supported by all browsers (in particular Chrome and Safari), thus making XFO particularly problematic [22]. CSP, instead, may be used to allow framing from a list of arbitrarily many Web origins specified through source expressions.…”
Section: Csp For Framing Controlmentioning
confidence: 99%
“…It is the misconfigured HTTP headers and the vulnerable response contents that are used for SCC attacks on secure traffic. Besides, the pervasiveness of inconsistencies among servers still affect some high profile websites [25,48,52]. Therefore, developers should pay more attention to the implementation details for security.…”
Section: Discussion 61 Root Causesmentioning
confidence: 99%
“…The study of inconsistencies in Web security has primarily focused on analyzing bugs leading to different levels of protection across browsers. Notably, previous work focused on incoherent implementations of the SOP [30,29], broken support for security mechanisms in mobile browsers [17], and differing guarantees in clickjacking protection [7]. Other papers also studied the inconsistent deployment of HTTP headers between the desktop and the mobile version of the same site [18,37].…”
Section: Inconsistencies In Web Securitymentioning
confidence: 99%