Using Context and Interactions to Verify User-Intended Network Requests

07/31/2020
by   He Shuang, et al.
0

Client-side malware can attack users by tampering with applications or user interfaces to generate requests that users did not intend. We propose Verified Intention (VInt), which ensures a network request, as received by a service, is user-intended. VInt is based on "seeing what the user sees" (context). VInt screenshots the user interface as the user interacts with a security-sensitive form. There are two main components. First, VInt ensures output integrity and authenticity by validating the context, ensuring the user sees correctly rendered information. Second, VInt extracts user-intended inputs from the on-screen user-provided inputs, with the assumption that a human user checks what they entered. Using the user-intended inputs, VInt deems a request to be user-intended if the request is generated properly from the user-intended inputs while the user is shown the correct information. VInt is implemented using image analysis and Optical Character Recognition (OCR). Our evaluation shows that VInt is accurate and efficient.

READ FULL TEXT

page 5

page 19

page 20

research
01/27/2023

CAPoW: Context-Aware AI-Assisted Proof of Work based DDoS Defense

Critical servers can be secured against distributed denial of service (D...
research
10/08/2012

Mining Permission Request Patterns from Android and Facebook Applications (extended author version)

Android and Facebook provide third-party applications with access to use...
research
08/11/2018

ESSMArT Way to Manage User Requests

Quality and market acceptance of software products is strongly influence...
research
05/01/2019

ON-OFF Privacy with Correlated Requests

We introduce the ON-OFF privacy problem. At each time, the user is inter...
research
06/23/2022

Intelligent Request Strategy Design in Recommender System

Waterfall Recommender System (RS), a popular form of RS in mobile applic...
research
05/07/2020

Database Traffic Interception for Graybox Detection of Stored and Context-Sensitive XSS

XSS is a security vulnerability that permits injecting malicious code in...
research
09/01/2023

The Role of User-Agent Interactions on Mobile Money Practices in Kenya and Tanzania

Digital financial services have catalyzed financial inclusion in Africa....

Please sign up or login with your details

Forgot password? Click here to reset