Version 2 2023-12-11, 20:22Version 2 2023-12-11, 20:22
Version 1 2023-11-29, 18:20Version 1 2023-11-29, 18:20
conference contribution
posted on 2023-12-11, 20:22authored bySebastian Roth, Stefano Calzavara, Moritz Wilhelm, Alvise Rabitti, Ben StockBen Stock
To mitigate a myriad of Web attacks, modern browsers support client-side security policies shipped through HTTP response headers. To enforce these defenses, the servers need to communicate them to the client, a seemingly straightforward process. However, users may access the same site in variegate ways, e.g., using different User-Agents, network access methods, or language settings. All these usage scenarios should enforce the same security policies, otherwise a security lottery would take place: depending on specific client characteristics, different levels of Web application security would be provided to users (inconsistencies). We formalize security guarantees provided through four popular mechanisms and apply this to measure the prevalence of inconsistencies in the security policies of top sites across different client characteristics. Based on our insights, we investigate the security implications of both deterministic and non-deterministic inconsistencies, and show how even prominent services are affected by them.
History
Preferred Citation
Sebastian Roth, Stefano Calzavara, Moritz Wilhelm, Alvise Rabitti and Ben Stock. The Security Lottery: Measuring Client-Side Web Security Inconsistencies. In: Usenix Security Symposium (USENIX-Security). 2022.
Primary Research Area
Empirical and Behavioral Security
Name of Conference
Usenix Security Symposium (USENIX-Security)
Legacy Posted Date
2022-05-03
Open Access Type
Unknown
BibTeX
@inproceedings{cispa_all_3645,
title = "The Security Lottery: Measuring Client-Side Web Security Inconsistencies",
author = "Roth, Sebastian and Calzavara, Stefano and Wilhelm, Moritz and Rabitti, Alvise and Stock, Ben",
booktitle="{Usenix Security Symposium (USENIX-Security)}",
year="2022",
}