DEMACRO: defense against malicious cross-domain requests

  • Authors:
  • Sebastian Lekies;Nick Nikiforakis;Walter Tighzert;Frank Piessens;Martin Johns

  • Affiliations:
  • SAP Research, Germany;IBBT-DistriNet, KU Leuven, Leuven, Belgium;SAP Research, Germany;IBBT-DistriNet, KU Leuven, Leuven, Belgium;SAP Research, Germany

  • Venue:
  • RAID'12 Proceedings of the 15th international conference on Research in Attacks, Intrusions, and Defenses
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

In the constant evolution of the Web, the simple always gives way to the more complex. Static webpages with click-through dialogues are becoming more and more obsolete and in their place, asynchronous JavaScript requests, Web mash-ups and proprietary plug-ins with the ability to conduct cross-domain requests shape the modern user experience. Three recent studies showed that a significant number of Web applications implement poor cross-domain policies allowing malicious domains to embed Flash and Silverlight applets which can conduct arbitrary requests to these Web applications under the identity of the visiting user. In this paper, we confirm the findings of the aforementioned studies and we design DEMACRO, a client-side defense mechanism which detects potentially malicious cross-domain requests and de-authenticates them by removing existing session credentials. Our system requires no training or user interaction and imposes minimal performance overhead on the user's browser.