JSSignature: Eliminating Third-Party-Hosted JavaScript Infection Threats Using Digital Signatures

12/10/2018
by   Kousha Nakhaei, et al.
0

Today, third-party JavaScript resources are indispensable part of the web platform. More than 88% of world's top websites include at least one JavaScript resource from a remote host. However, there is a great security risk behind using a third-party JavaScript resource, if an attacker can infect one of these remote JavaScript resources all websites those have included the script would be at risk. In this paper, we present JSSignature, an entirely at the client-side pure JavaScript framework in order to validate third-party JavaScript resources using digital signature. Therefore, all included JavaScript resources are checked against the integrity, authentication and non-repudiation risks before the execution. In contrary to existing methods, JSSignature protects web pages regardless of third-party resource infection nature while it does not set any restrictions on trusted JavaScript providers. This approach has an acceptable one-time performance overhead and is an easily deployable add-in. We have validated the proposed solution by applying tests on an implemented version[The source-code, resources and the working demo are available at JSSignature website.]

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/23/2019

The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading

The Web is a tangled mass of interconnected services, where websites imp...
research
11/02/2018

Include Me Out: In-Browser Detection of Malicious Third-Party Content Inclusions

Modern websites include various types of third-party content such as Jav...
research
02/10/2023

Exploring the Cookieverse: A Multi-Perspective Analysis of Web Cookies

Web cookies have been the subject of many research studies over the last...
research
11/02/2018

Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web

Web developers routinely rely on third-party Java-Script libraries such ...
research
03/13/2019

Preventing the attempts of abusing cheap-hosting Web-servers for monetization attacks

Over the past decades, the web is always one of the most popular targets...
research
03/02/2022

Rpkiller: Threat Analysis from an RPKI Relying Party Perspective

The Resource Public Key Infrastructure (RPKI) aims to secure internet ro...
research
11/24/2021

Third-party Service Dependencies and Centralization Around the World

There is a growing concern about consolidation trends in Internet servic...

Please sign up or login with your details

Forgot password? Click here to reset