2019 IEEE Symposium on Security and Privacy (SP) 2019
DOI: 10.1109/sp.2019.00053
|View full text |Cite
|
Sign up to set email alerts
|

Postcards from the Post-HTTP World: Amplification of HTTPS Vulnerabilities in the Web Ecosystem

Abstract: HTTPS aims at securing communication over the Web by providing a cryptographic protection layer that ensures the confidentiality and integrity of communication and enables client/server authentication. However, HTTPS is based on the SSL/TLS protocol suites that have been shown to be vulnerable to various attacks in the years. This has required fixes and mitigations both in the servers and in the browsers, producing a complicated mixture of protocol versions and implementations in the wild, which makes it uncle… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
15
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 60 publications
1
15
0
Order By: Relevance
“…We demonstrate this vulnerability in both browsers in demo videos [11], [13]. This could potentially allow related-domain attackers [26] to bypass the cookie-integrity checks recently adopted by browsers that rely on cookie prefixes [24]. In both cases, the user sees a lock icon in the URL bar indicating their connection to the web server is secure, when in reality it is not.…”
Section: Data Saving Mode Security Degradationmentioning
confidence: 98%
“…We demonstrate this vulnerability in both browsers in demo videos [11], [13]. This could potentially allow related-domain attackers [26] to bypass the cookie-integrity checks recently adopted by browsers that rely on cookie prefixes [24]. In both cases, the user sees a lock icon in the URL bar indicating their connection to the web server is secure, when in reality it is not.…”
Section: Data Saving Mode Security Degradationmentioning
confidence: 98%
“…We audit the security of web sessions against the traditional threats posed by web attackers and network attackers, the standard attacker models of the web security literature [12], which have been commonly used in previous web session security studies, e.g., [13,14,8,15,1,16,17,9]. A web attacker is an unprivileged web user who operates a browser and has control of a malicious website.…”
Section: Threat Modelmentioning
confidence: 99%
“…We also assume perfect cryptography, in the sense that our analysis focuses on session security, not cryptographic security of HTTPS. Note that cryptographic weaknesses in HTTPS implementations are generally harder both to identify and to exploit in practice [16].…”
Section: Threat Modelmentioning
confidence: 99%
“…Orthogonal to this line of research, researchers have studied the affects of TLS vulnerabilities on Web security [10]. Moreover, there have been studies on whether general Web security mechanisms (e.g., HSTS, CSP, Referrer Policy, etc.)…”
Section: Related Workmentioning
confidence: 99%