Interactive History Sniffing with Dynamically-Generated QR Codes and CSS Difference Blending

2022 IEEE Security and Privacy Workshops (SPW)(2022)

引用 3|浏览3
暂无评分
摘要
In a user-assisted history sniffing attack, first introduced by Weinberg, Chen, Jayaraman, and Jackson, a web site user can be tricked into revealing portions of their browsing history by performing an interactive task, like solving a CAPTCHA puzzle, that is dynamically generated based on the sites they have recently visited. Unlike automated history sniffing attacks, which often can probe 1000s of sites in a user’s browsing history, such user-assisted attacks have typically been limited to probing a much smaller number of sites.In this paper, we introduce a new user-assisted history sniffing attack based on malicious QR codes. These dynamically-generated QR codes allow a malicious site to probe thousands of links from a victim user’s browsing history. Generating these malicious QR codes based on the user’s history turns out to be challenging due to the required error-correcting properties. To overcome this issue, we show how to use a recent browser feature, CSS difference blending, to simulate an exclusive-OR of the dots in a QR code and correctly generate the error-correcting bits. This method of dynamically generating a valid QR code based on private user data may be of independent interest. Our results provide further evidence that the history sniffing defenses recently proposed by Smith, Disselkoen, Narayan, Brown, and Stefan should be seriously considered by browser vendors.
更多
查看译文
关键词
Web site user,private user data,valid QR code,victim user,malicious site,malicious QR codes,user-assisted history sniffing attack,automated history sniffing attacks,interactive task,browsing history,CSS difference blending,dynamically-generated QR codes,interactive history sniffing
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要