2020 IEEE Symposium on Security and Privacy (SP) 2020
DOI: 10.1109/sp40000.2020.00077
|View full text |Cite
|
Sign up to set email alerts
|

Meddling Middlemen: Empirical Analysis of the Risks of Data-Saving Mobile Browsers

Abstract: Mobile browsers have become one of the main mediators of our online activities. However, as web pages continue to increase in size and streaming media on-the-go has become commonplace, mobile data plan constraints remain a significant concern for users. As a result, data-saving features can be a differentiating factor when selecting a mobile browser. In this paper, we present a comprehensive exploration of the security and privacy threat that data-saving functionality presents to users. We conduct the first an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…In the context confusion attack, the attack occurs because of shared TLS certificates; thereby, the adversary reroutes the request is bypassed to a flawed certificate-sharing server. Use of intermediate entities like malicious proxies [6], [26]- [30] or interception software's [26], [27], a form of MITM attacks, cause the origin confusion issues as the attacker can hijack the secure traffic between the client and server.…”
Section: Security Analysismentioning
confidence: 99%
“…In the context confusion attack, the attack occurs because of shared TLS certificates; thereby, the adversary reroutes the request is bypassed to a flawed certificate-sharing server. Use of intermediate entities like malicious proxies [6], [26]- [30] or interception software's [26], [27], a form of MITM attacks, cause the origin confusion issues as the attacker can hijack the secure traffic between the client and server.…”
Section: Security Analysismentioning
confidence: 99%
“…With web apps continuously introducing novel functionality to increase user engagement, browsers deploy new APIs and technologies to support such initiatives. As a result, modern web browsers often integrate new technologies and mechanisms that introduce novel attack vectors with significant security and privacy implications [35], [36], [47], [27]. As such, it is crucial that the security community conducts in-depth investigations of the risks introduced by emerging browser features.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, emphasis has been placed on changing Web browsing to consume less data [9,11,44,46,51]. While there has been some public confusion over the exact workings and reach of such data-saving methods [33], recent studies of their actual implementations [31,37,54] reveal a few key shortcomings.…”
Section: Introductionmentioning
confidence: 99%
“…First and foremost, these solutions impose various privacy concerns to their users when compared to regular Web browsing. Some are deployed as middlebox services which either transparently proxy the user's unencrypted traffic [11,51], or, apply URL redirection [23] or Man-in-the-Middle proxies [44,46,58] to also operate on encrypted traffic (HTTPS) [37,54]. Given the rise of HTTPS [28], the former sees limited use, while the latter breaks the end-to-end principles of TLS, exposing potentially private or personalized Web contents to third parties [37,54].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation