Proceedings 2017 Network and Distributed System Security Symposium 2017
DOI: 10.14722/ndss.2017.23100
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots

Abstract: In this paper, we present ChromePic, a web browser equipped with a novel forensic engine that aims to greatly enhance the browser's logging capabilities. ChromePic's main goal is to enable a fine-grained post-mortem reconstruction and trace-back of web attacks without incurring the high overhead of record-andreplay systems. In particular, we aim to enable the reconstruction of attacks that target users and have a significant visual component, such as social engineering and phishing attacks. To this end, Chrome… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 14 publications
0
9
0
Order By: Relevance
“…These principles can also apply at the application level. In [45], the authors instrument the Chrome web browser to enable the logging and replay of the user action contexts, i.e., the document object model that contains web page objects and Javascript source code. By enabling the finer-grained logging of action contexts, these methodologies also allow the approximation of the contextual action causal dependency model.…”
Section: B Object State Snapshotsmentioning
confidence: 99%
“…These principles can also apply at the application level. In [45], the authors instrument the Chrome web browser to enable the logging and replay of the user action contexts, i.e., the document object model that contains web page objects and Javascript source code. By enabling the finer-grained logging of action contexts, these methodologies also allow the approximation of the contextual action causal dependency model.…”
Section: B Object State Snapshotsmentioning
confidence: 99%
“…web browser with the forensic engine named ChromePic [38], which could record and reconstruct the process of common web attacks based on Chromium. Jayasinghe et al proposed a novel dynamic approach to detect drive-by download attacks [1], and it can monitor the bytecode generated by a browser in real time with low performance overhead.…”
Section: Page Content Analysis Vadrevu Et Al Proposed a Newmentioning
confidence: 99%
“…Then, an HTTP-based redirection takes the browser to a page on pressupdateforsafesoft[.]download. As we will see later, this page renders as shown in the screenshots of Figures 1c-1e (notice that while JSgraph does not log visual screenshots, this functionality could be easily implemented very efficiently with the approach used by ChromePic [43]). As the user clicks on the download button (see Figure 1d), this corresponds to clicking on an HTML anchor that navigates the browser to the pressbuttonforupdate[.…”
Section: B Motivating Examplementioning
confidence: 99%
“…One possible way would be to record, and later statically analyze, all the HTML and JavaScript content loaded by the browser during a time window that includes the attack. This could be done by recording all network traffic traces, or by using a lightweight system such as ChromePic [43]. However, understanding how the browser loaded, parsed, interpreted, and rendered the web content from network traces is notoriously hard [38].…”
Section: T Previous Workmentioning
confidence: 99%