Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications
نویسندگان
چکیده
Modern web applications frequently implement complex control flows, which require the users to perform actions in a given order. Users interact with a web application by sending HTTP requests with parameters and in response receive web pages with hyperlinks that indicate the expected next actions. If a web application takes for granted that the user sends only those expected requests and parameters, malicious users can exploit this assumption by crafting harming requests. We analyze recent attacks on web applications with respect to user-defined requests and identify their root cause in the missing enforcement of allowed next user requests. Based on this result, we provide our approach, named Ghostrail, a control-flow monitor that is applicable to legacy as well as newly developed web applications. It observes incoming requests and lets only those pass that were provided as next steps in the last web page. Ghostrail protects the web application against race condition exploits, the manipulation of HTTP parameters, unsolicited request sequences, and forceful browsing. We evaluate the approach and show that it neither needs a training phase nor a manual policy definition while it is suitable for a broad range of web technologies.
منابع مشابه
Toward Principled Browser Security
To ensure the confidentiality and integrity of web content, modern web browsers enforce isolation between content and scripts from different domains with the same-origin policy (SOP). However, many web applications require cross-origin sharing of code and data. This conflict between isolation and sharing has led to an ad hoc implementation of the SOP that has proven vulnerable to such attacks a...
متن کاملEnforcing Forward-Edge Control-Flow Integrity in GCC & LLVM
Constraining dynamic control transfers is a common technique for mitigating software vulnerabilities. This defense has been widely and successfully used to protect return addresses and stack data; hence, current attacks instead typically corrupt vtable and function pointers to subvert a forward edge (an indirect jump or call) in the control-flow graph. Forward edges can be protected using Contr...
متن کاملA Survey on Control-Flow Integrity Means in Web Application Frameworks
Modern web applications frequently implement complex control flows, which require the users to perform actions in a given order. Users interact with a web application by sending HTTP requests with parameters and in response receive web pages with hyperlinks that indicate the expected next actions. If a web application takes for granted that the user sends only those expected requests and parame...
متن کاملQos Enabled Communication Support over Multicast Ad Hoc Networks: An Overview
Multicasting Routing in Mobile Ad hoc networks faces various issues related to Quality of Services (QoS) which suffer from behavior of routing protocols, topology, group management, security and group mobility. QoS constraints can be categorized by their application domains also i.e. for military, we need to maintain QoS for confidentiality and data integrity by compromising with control overhe...
متن کاملImplementing Role Based Access in Healthcare Ad Hoc Networks
As mobile ad hoc networks (MANETs) are becoming popular for a variety of applications, so are the issues surrounding corresponding implementations. In this paper, a healthcare application is developed for an environment where normal network connectivity may not be available hence networking of small scale healthcare units and corresponding devices becomes necessary. Different roles of such unit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014