Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks

08/06/2019
by   Avinash Sudhodanan, et al.
0

In a Cross-Origin State Inference (COSI) attack, an attacker convinces a victim into visiting an attack web page, which leverages the cross-origin interaction features of the victim's web browser to infer the victim's state at a target web site. COSI attacks can have serious consequences including determining if the victim has an account or is the administrator of a prohibited target site, determining if the victim owns sensitive content or is the owner of a specific account at the target site. While COSI attacks are not new, they have previously been considered as sparse attacks under different names. This paper is the first to systematically study COSI attacks as a comprehensive category and to present a tool for detecting COSI attacks. We introduce the concept of a COSI attack class to capture related attack variants and identify 39 COSI attack classes, of which 22 are new, and the rest generalize existing attacks. We discover a novel XS-Leak based on window.postMessage. We design a novel approach to detect COSI attacks, and implement it into Basta-COSI, a tool that produces attack web pages that demonstrate the existence of COSI attacks in a target web site. We apply Basta-COSI to four popular stand-alone web applications and six popular live sites, finding COSI attacks against each of them. Finally, we discuss defenses against COSI attacks.

READ FULL TEXT
research
05/14/2018

User Blocking Considered Harmful? An Attacker-controllable Side Channel to Identify Social Accounts

This paper presents a practical side-channel attack that identifies the ...
research
12/12/2021

Pool-Party: Exploiting Browser Resource Pools as Side-Channels for Web Tracking

We identify a new class of side-channels in browsers that are not mitiga...
research
11/13/2021

Categorizing Service Worker Attacks and Mitigations

Service Workers (SWs) are a powerful feature at the core of Progressive ...
research
01/29/2021

State of the Art: Content-based and Hybrid Phishing Detection

Phishing attacks have evolved and increased over time and, for this reas...
research
04/02/2020

CORSICA: Cross-Origin Web Service Identification

Vulnerabilities in private networks are difficult to detect for attacker...
research
02/20/2023

Poisoning Web-Scale Training Datasets is Practical

Deep learning models are often trained on distributed, webscale datasets...
research
09/05/2019

Towards a general model for psychopathology

The DSM-1 was published in 1952, contains 128 diagnostic categories, des...

Please sign up or login with your details

Forgot password? Click here to reset