DOMtegrity: Ensuring Web Page Integrity against Malicious Browser Extensions

05/30/2019
by   Ehsan Toreini, et al.
0

In this paper, we address an unsolved problem in the real world: how to ensure the integrity of the web content in a browser in the presence of malicious browser extensions? The problem of exposing confidential user credentials to malicious extensions has been widely understood, which has prompted major banks to deploy two-factor authentication. However, the importance of the `integrity' of the web content has received little attention. We implement two attacks on real-world online banking websites and show that ignoring the `integrity' of the web content can fundamentally defeat two-factor solutions. To address this problem, we propose a cryptographic protocol called DOMtegrity to ensure the end-to-end integrity of the DOM structure of a web page from delivering at a web server to the rendering of the page in the user's browser. DOMtegrity is the first solution that protects DOM integrity without modifying the browser architecture or requiring extra hardware. It works by exploiting subtle yet important differences between browser extensions and in-line JavaScript code. We show how DOMtegrity prevents the earlier attacks and a whole range of man-in-the-browser (MITB) attacks. We conduct extensive experiments on more than 14,000 real-world extensions to evaluate the effectiveness of DOMtegrity.

READ FULL TEXT

page 1

page 3

research
04/13/2021

WAIT: Protecting the Integrity of Web Applications with Binary-Equivalent Transparency

Modern single page web applications require client-side executions of ap...
research
08/06/2023

A Security and Usability Analysis of Local Attacks Against FIDO2

The FIDO2 protocol aims to strengthen or replace password authentication...
research
01/17/2023

Verifiable Fully Homomorphic Encryption

Fully Homomorphic Encryption (FHE) is seeing increasing real-world deplo...
research
08/06/2019

After You, Please: Browser Extensions Order Attacks and Countermeasures

Browser extensions are small applications executed in the browser contex...
research
09/09/2021

PATRIOT: Anti-Repackaging for IoT Firmware

IoT repackaging refers to an attack devoted to tampering with a legitima...
research
10/26/2021

Precise URL Phishing Detection Using Neural Networks

With the development of the Internet, ways of obtaining important data s...
research
07/29/2020

Towards a Backdoorless Network Architecture Based on Remote Attestation and Backdoor Inspection

To keep a system secure, all devices in the system need to be benign. To...

Please sign up or login with your details

Forgot password? Click here to reset