SlideShare ist ein Scribd-Unternehmen logo
1 von 6
The Conundrum of Declarative Security
                     HTTP Response Headers: Lessons Learned
                                  Aditya K Sood, Richard J. Enbody
                          Department of Computer Science and Engineering
                     Michigan State University, East Lansing, MI 48824-1226, USA
                            soodadit@cse.msu.edu, enbody@cse.msu.edu


Abstract                                                           part of the web server or application running on the server.
                                                                   In this way, declarative security provides both portable
                                                                   and flexible security defense. Most of these declarative
 The stringency of attacks has grown simultaneously with           security protection parameters are not the part of HTTP
the development of the web. To combat some of the new at-          1.1 specification, but are considered as vendor specific or
tacks, declarative security has been proposed in the form          customized security solutions related to a specific prod-
of HTTP response headers from the server side. The                 uct. Usually, the declarative security in HTTP param-
declarative model provides an extensible set of security           eters is understood as the ”X” factor protection. Most
parameters in form of HTTP responses. In this, browsers            of the HTTP headers start with ”X” in order to differen-
can respond with a requested security mechanism. This              tiate between standard HTTP 1.1 and normalized ones.
paper explores the state of HTTP declarative security and          Some of the headers that define the declarative secu-
how it is being applied today.                                     rity are X-XSS-Protection, X-Frame-Options, X-Content-
                                                                   Type-Options, X-Download-Options, X-Content-Security-
                                                                   Policy, etc. Microsoft and Mozilla have adopted this type
                                                                   of security. We will describe declarative security and the
1 Introduction                                                     corresponding attacks in the next section in more detail.

                                                                      This paper aims to determine the state of declarative se-
With the advent of new web attacks, protective strategies          curity by testing the Alexa [11] top 1000 websites to find
have had to adapt. The latest attacks such as Clickjack-           the penetration of this type of security. In addition, we
ing [1], XSS Filter bypassing, MIME sniffing [9] have               will discuss some fallacies and problems with the declar-
dramatically affected the World Wide Web community.                ative security model and the lessons learned during this
No doubt XSS has been the most exploited bug in ap-                experiment. For our analysis, we will be covering a set of
plications, but the new generation attacks such as Cross           declarative protection headers which have been deployed
Site Request Forging (CSRF), Clickjacking and so on                to prevent the new attack trends on the web.
have transformed the nature of exploitation. The new at-
tack patterns require new type of security mechanisms be-
cause of the vector of origination. New security solutions,
named Declarative Security have been proposed and are              2     Applied Security Model
applied at a low level in the HTTP. The main idea is to
specify security in an HTTP parameter that is set by the           According to the Microsoft’s applied security model
server and is sent along to the web browser as a part of the       [12,13], implementation of security can be either impera-
in-line response. A browser renders the content of that            tive or declarative. The security model is deployed based
web page by scrutinizing the HTTP headers and tries to             on the two factors as:
invoke the specified security module in order to head off
the attacks.
                                                                       • A security model is considered as declarative [12], if
   As the name implies, the protection parameters for a                  the security features are implemented in the applica-
specific set of attack are declared by the developer as a                 tion as a parameter which is used at the run time.


                                                               1
• A security model is considered as imperative [13] , if           use differential techniques such as compressed frames as
    the security features such as permissions are allowed            hidden or transparent, trapping mouse events [2], or UI
    to generate or invoke a new object based on the re-              Redressing [3] primarily to trap the user. A number of
    quirements of the code.                                          protection mechanisms have been implemented including
                                                                     frame bursting codes [4], or restricting the frame execu-
                                                                     tion. Microsoft introduced a protection feature in HTTP
    The major difference between these two security mod-
                                                                     headers as a part of declarative security. The X-FRAME-
els is that imperative security is used to perform opera-
                                                                     OPTIONS [5] sets a restriction on the framing of a web
tions based on the demands and overrides, whereas declar-
                                                                     page for a particular domain. It uses the value DENY
ative security issues requests. Declarative security has the
                                                                     and SAMEORIGIN for rendering the contents into a child
advantage that the ’request’ model allows easier integra-
                                                                     frame. It is possible to stop the rendering completely in
tion within existing implementations as well as the flexi-
                                                                     a child frame using DENY as a parameter. The SAMEO-
bility to adapt to new attacks.
                                                                     RIGIN parameter declares that the content can only come
                                                                     from the parent site and that no third party content render-
                                                                     ing is allowed.
3 HTTP Declarative Security

Recent web attacks have proven to be difficult to handle
in the real time. Examples include Clickjacking, MIME                3.1.2 CSRF and XSS Attacks: The advanced level of
sniffing, manipulating file downloads, CSRF, and XSS                   Cross-Site Scripting (XSS) attacks in collaboration with
variants. In response, the declarative security model has            the Cross Site Request Forging (CSRF) has had a dra-
been proposed. It uses an HTTP header that has to be de-             matic impact on the World Wide Web. In order to protect
clared on the server side by the developer or administra-            against this attack, companies such as Mozilla and Mi-
tor. The HTTP header triggers a response in the browser              crosoft have introduced a declarative security parameter.
to deploy requested security on the client side.                     Mozilla has introduced Content Security Policy (CSP) [6].
                                                                     The CSP provides the HTTP header X-Content-Security-
    Browsers play a critical role in determining the suc-            Policy which is defined by a particular site in order to
cess of these types of attacks, so it is required that servers       define the characteristics of the content to be rendered.
and client browsers coordinate to fend off the attacks. To           In particular, the header specifies what content can be
facilitate coordination, browsers are modified to recog-              trusted. To prevent reflective cross site scripting attacks,
nize declarative security headers in HTTP headers sent               Microsoft implemented a protection feature in the form of
by servers. Once a declarative security HTTP header is               HTTP header X-XSS-Protection[8]. If a website specifies
detected, the browser will execute the requested secu-               this HTTP header, the browser will trigger the XSS filter
rity mechanism. Of course, if the server does not serve              and stop the rendering of the content in Internet Explorer.
up HTTP headers with declarative security parameters,no
protection can be implemented. Similarly, if browsers
cannot recognize the headers, no protection can be de-
ployed.
                                                                     3.1.3 MIME Scripting Attacks: An unrestricted con-
                                                                     tent type included from a third party can disrupt the ro-
                                                                     bustness of a web application resulting in security prob-
3.1    Types of Threats                                              lems. There are a number of attacks that utilize the
                                                                     Content-Type header to replace specific content elements
The HTTP header parameters are specific to particular                 with malicious code to be downloaded and rendered in
types of attacks. Here we examine a set of attacks (and              the browser. The malicious code gets executed in the con-
protections) that can be specified in the headers.                    text of the domain which can result in stealing of data.
                                                                     Microsoft has introduced a protection feature in the form
                                                                     of HTTP header as X-Content-Type-Options [9] for sub-
3.1.1 Clickjacking Attacks: The clickjacking attacks                 verting the MIME sniffing attacks. The nosniff parameter
[1] are a new class of attacks that use differential tech-           stops the rendering of image as a MIME object and trans-
niques to hide or obscure an element for trapping the user           forms it into plain text format to avoid the execution of
to visit destinations that he did not intend to visit. They          scripts.

                                                                 2
3.1.4 File downloading Scripting Attacks: These                    be determined only based on the deployed security solu-
types of attacks are commonly used for exploitation. It            tions. In addition, we have tested some popular websites
is based on the fact that some browsers such as Internet           that are not on the list.
Explorer use inbuilt functionality to open the files directly
from the domain while downloading . As a result, any                  We wrote a small PERL tool named x enum to ana-
malicious file that opens directly from the domain results          lyze websites. Since this experiment is entirely based on
in untamed output which is a result of the scripts present         the protection features implemented in HTTP headers, we
in it. Microsoft has introduced a new protection feature as        resorted to low level HTTP debugging to analyze the re-
a part of its declarative security as X-Download-Options           sponses. The tool is designed in two modules. The first
[9] which stops the opening of the files directly from the          module traps the responses and performs pattern match-
domain. The browser removes the file-opening control                ing to detect the presence of a particular security param-
from the download box when it encounters a noopen pa-              eter. The second module examines the behavior of HTTP
rameter in the X-Download-Options as a part of the HTTP            headers. Based on the output, we are able to determine
response.                                                          the type of attack that is sanitized by the domain through
                                                                   these headers.

                                                              The experiment is strictly based on the security that is
4 Experiment                                               declared in the HTTP headers and does not cover the stan-
                                                           dard security modules used on the client side. It is possi-
                                                           ble to have a number of countermeasures for a particular
What is the state of declarative security? Are servers attack, but this analysis only covers the security solutions
making these declarations? Are clients responding? As implemented at a low level in the HTTP protocol.
pointed out earlier, action is needed from both the server
and client sides in order for this technique to work.

                                                                   4.3 Results
4.1    Objectives
                                                             The results indicate that very few websites out of the
Here is a list of objectives that what we want to achieve: Alexa [11] top 1000 websites are using any of the declar-
                                                             ative security headers when a request is initiated for the
                                                             default web page and other linked pages at the time of
  1. To determine how widely adopted declarative secu- testing. Out of the 1000 websites containing over 15,000
     rity is for new attacks.                                pages, that were put to test, we have not detected any
                                                             website that is using all the parameters. We also tried
  2. To determine whether server softwares from different
                                                             some intensive tests on the sub-domains and mail service
     vendors are using the solutions by default.
                                                             providers on the popular websites such as Google, Yahoo,
  3. To examine the effectiveness of the combined security Ebay, etc.
     solution between the client side and the server side.
                                                                 Table 2 shows the acceptance level of declarative secu-
  4. To estimate the risks to the business in the online     rity in HTTP response headers in the top 1000 websites.
     world.                                                  A ”Yes” indicates that at least one type of declarative se-
                                                             curity header was used. Only one site out of the top 25
                                                             uses any declarative security headers and only 7 of the top
                                                             25 use headers. Overall, only 8 of the top 1000 use any
4.2 Testbed
                                                             declarative security headers. At the bottom of the table
                                                             we have included a few security-oriented sites to indicate
For our experiment, we used Alexa [11] for a list of the that usage does exist outside the top 25.
top 1000 websites across a number of different domains.
Since their ranking is based on web traffic we will be ex-        Table 1 shows the applied declarative security by
amining sites that are not only popular, but also attractive different web servers that are mostly used in top 1000
to malicious users. The number of users associated with domains ranked by Alexa. We have looked at the type
a specific domain indicates the severity of risk and ex- of web servers that are used extensively. There is a
ploitation if an attack happens. The protection factor can possibility of existence of different web servers apart


                                                               3
Web Server              Headers                      Rank           Website                Server          Headers
             GSE                      Yes                         1           google.com               GSE 2.0           Yes
             Apache/1.3.41.fb2        None                        2          facebook.com         Apache/1.3.41.fb2      None
             Apache                   Yes                         3           youtube.com              Apache            Yes
             YTS                      None                        4            yahoo.com             YTS/1.18.4          None
             MS-IIS                   None                        5              live.com             MS-IIS/7.0         None
             Sun-JS-Web-Server        None                        6          wikipedia.org      Sun-JS-Web-Server/7.0    None
             sffe                     Yes                         7             baidu.com             BWS/1.0            None
             Apache-Coyote            None                        8           blogger.com                sffe            Yes
             Server                   None                        9              msn.com           Microsoft-IIS/6.0     None
             GFE 2.0                  Yes                         10              qq.com             nginx/0.6.39        None
             BWS/1.0                  None                        11           twitter.com            Apache, hi         None
             Resin/2.1.17             None                        12           yahoo.co.jp           YTS/1.16.4          None
             Ning HTTP Server 2.0     None                        13          google.co.in              GWS              Yes
             nginx                    None                        14           taobao.com              Apache            None
             IBM HTTP Server          None                        15            google.de               GWS              Yes
             KONICHIWA/1.0            None                        16         google.com.hk              GWS              Yes
             Cafe                     Yes                         17         wordpress.com              nginx            None
             AmazonS3                 Yes                         18          sina.com.cn        Apache/2.0.54 (Unix)    None
                                                                  19          google.co.uk              GWS              None
Table 1: Types of Web servers used in the top 1000 Web-           20          amazon.com                Server           None
sites and their declarative security header usage.                21         myspace.com              MS-IIS/7.5         None
                                                                  22         microsoft.com            MS-IIS/7.5         None
                                                                  23             google.fr              GWS              Yes
from the web servers listed in the Table 1. The Google’s          24            bing.com           Microsoft-IIS/6.0     None
                                                                  25            ebay.com          Apache-Coyote/1.1      None
GSE server is using most of HTTP header protection
                                                                  ...
parameters during monetary transactions. This has been
                                                                  62           orkut.com               GFE 2.0               Yes
noticed in Gmail and Google checkout sub-domain. The
                                                                  ...
response is evaluated as                                          1000+    adsense.google.com           Cafe                 Yes
                                                                  1000+         gmail.com              GSE 2.0               Yes
HTTP/1.1 200 OK                                                   1000+        ha.ckers.org            Apache                Yes
Cache-Control: no-cache, no-store, max-age=0                      1000+        noscript.net            Apache                Yes
Pragma: no-cache                                                  1000+        flashgot.net             Apache                Yes
Expires: Fri, 01 Jan 1990 00:00:00 GMT                            1000+    eyeviewdigital.com         AmazonS3               Yes
Date: Wed, 14 Apr 2010 19:46:54 GMT
Content-Type: text/html; charset=UTF-8                           Table 2: Applied declarative security as HTTP response
Set-Cookie: [Cookie value is truncated]                          headers in top 1000 websites.
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block                                  Blogger’s sffe server also implement this option.
Server: GSE
                                                                    The Facebook Apache/1.3.41.fb2 , Twitter’s Apache
   The Yahoo Traffic Server (YTS), used for Yahoo mail            and Server hi , MySpace’s Microsoft IIS 7.5 servers do
and other service websites, does not provide any signs of        not indicate usage of declarative parameters, but Orkut’s
usage of declarative security. The Rediff Apache Server          GFE 2.0 server uses X-XSS-Protection:0 as one of the re-
and Microsoft IIS 6.0/7.0 used for Rediffmail and Hotmail        sponse header. Further, Orkut uses GSE server for collab-
respectively, are completely ignoring the HTTP header            orative work. Popular websites such as NetFlix, Flickr,
protection parameters. The s0.2mdn.net and *.ytimg.com           Ning, Photobucket, Linkedin, Internet Movie Database
hosts images and flash files that are used in major websites       (IMDb), Paypal, Skype are not using declarative security
such as Youtube, Amazon, Hotmail etc. for advertisement          specific HTTP response headers.
purposes. It uses X-Content-Type-Options:nosniff in its
responses for preventing MIME sniffing. The Youtube’s                Further, we looked at a number of websites having a
Apache server, Google Advertisement Cafe server and              high page rank apart from the top 1000 list from Alexa


                                                             4
[11]. We noticed that some of the websites that are                in HTTP headers. Declarative security appears to be ”Se-
popular in the security community provide us with some             curity by Choice”. On the other hand, many open source
good signs. The ha.ckers.org, noscript.net, flashgot.net            web servers have not implemented these security solu-
shows the use of declarative security as:                          tions by default.

HTTP/1.1 200 OK
Date: Thu, 15 Apr 2010 17:45:28 GMT                                5.3 Our analysis has shown that awareness may be a
Server: Apache                                                     roadblock in the effective development of an optimal se-
Content-Script-Type: text/javascript                               curity solution. Looking at the results, we speculate that
X-FRAME-OPTIONS: SAMEORIGIN                                        there are three main issues that impact the awareness. The
X-XSS-Protection: 0                                                first one may be that the developers are not well educated
Vary: Accept-Encoding,User-Agent                                   about the existence of the new types of web attacks. In
Connection: close                                                  the absence of awareness about the attacks, it is hard to
Content-Type: text/html; charset=UTF-8                             expect an appropriate and robust solution to be deployed.
                                                                   Second, changes are required in a huge number of web
                                                                   applications and the deployed hosting infrastructure to
    In summary, we have not seen much variations as few            strengthen the security. Third, a problem may lie in the
commercial websites include any HTTP headers that con-             acceptance of these solutions as being robust. For exam-
tain the specific set of declarative security parameters. We        ple, most of the HTTP header based solutions are vulner-
noticed that even some of the most popular and recog-              able to classic HTTP Response Splitting [10] attacks, but
nized security companies, banks, and organizations have            these can be circumvented by applying additional security
not adopted this solution. It appears that declarative secu-       measures.
rity is not widely implemented on the server side.

                                                             5.4 A declarative solution requires participation of both
5 Lessons Learned                                            the server and the client. If either is not participating, no
                                                             security action is taken. From our results, it is apparent
                                                             that there is little participation on the server side so the
During the course of this testing, we did not encounter risk of these web attacks remains high.
any serious problems, but there were certain issues that
made the testing a time consuming process. The handling
and generation of responses depend a lot on the nature and 5.5 While we found that the declarative security solu-
design of web application including configuration of the tions are not widely implemented, we have noticed some
web server. During our research, websites using HTTP to evidence of acceptance of declarative security in security-
HTTPS redirection produced long delays in the responses oriented sites.
and even experienced hanging of processes. We found
that different web servers handle the request differently
and hence showed differential behavior in their response.
A lot of variance has been noticed during the course of this 6 Conclusion and Future Work
experiment. In the end, with the appropriate manual effort
and automated solutions, the tests have been completed We have taken a look at one of the issue of getting an op-
successfully. We conclude:                                   tional security mechanism embedded in HTTP response
                                                         headers: adoption. A declarative solution requires partici-
                                                         pation of both the server and the client. There are pros and
5.1 The main commercial web servers, such as IIS cons of such a protocol. An advantage is that if few major
and IBM HTTP SERVER, have not implemented attack- browsers implement the client side, the burden then falls
specific HTTP headers in their default responses.         on the server side. However, the downside is the same:
                                                         the burden is now on the server side, and that is where we
                                                         find ourselves.
5.2 Our analysis shows that websites running open and
customized web servers such as Apache, GWE, GWS,            Briefly, some browsers have it, but few servers are
Cafe are the only ones deploying the security parameters serving it. In this case, half a solution is no solution, but


                                                               5
it is early in the game.                                       [12] MSDN - Microsoft Declarative Security Model.
                                                               http://msdn.microsoft.com/enus/library/kaacwy28.aspx
   Once both servers and clients are fully compliant, the
open question becomes: how effective will declarative [13] MSDN - Microsoft Imperative Security Model.
headers be to circumvent this class of attack? There is http://msdn.microsoft.com/enus/library/0xkh23z7.aspx
hope that the flexibility of this approach may allow fast
response to any weaknesses.                               [14] SecNiche Security - http://www.secniche.org

   Finally, if this approach proves to be successful, what [15] Armorize Technologies - http://www.armorize.com
other classes of attack will this be appropriate for?

Acknowledgment: A sincere thanks to SecNiche Secu-
rity [14] and Armorize [15] for supporting and giving me
enough time to pursue work of this kind.



7 References

[1] Clickjacking - Robert R Hansen and Jeremiah Gross-
man. http://sectheory.com/clickjacking.htm, 2009

[2] Blog Article - More towards Clickjacking, Aditya
K Sood. http://zeroknock.blogspot.com/2009/02/more-
towards-clickjacking-simulating.html, 2009

[3] Browser Security Handbook- UI Redressing.
http://code.google.com/p/browsersec/wiki/Part2

[4] Frame Bursting Technique. Source Wikipedia -
http://en.wikipedia.org/wiki/Framekiller

[5] Blog Article - ClickJacking Protection Feature.
http://blogs.msdn.com/ie/archive/2009/01/27/ie8-
security-part-vii-clickjacking-defenses.aspx

[6] Complete Details - Content Security Policy.
                          ˜
http://people.mozilla.org/bsterne/content-security-
policy/details.html

[7] Specification Details - Content Security Policy.
https://wiki.mozilla.org/Security/CSP/Spec

[8] XSS Filter Details - Reflected XSS Protec-
tion. http://blogs.msdn.com/ie/archive/2008/07/01/ie8-
security-part-iv-the-xss-filter.aspx

[9] IE Blog - Comprehensive Protection Parame-
ters    http://blogs.msdn.com/ie/archive/2008/07/02/ie8-
security-part-v-comprehensive-protection.aspx

[10] Details about HTTP Response Splitting Attacks.
http://www.securiteam.com/securityreviews/5WP0E2KFGK.html

[11] Alexa Top Sites. http://www.alexa.com/topsites


                                                           6

Weitere ähnliche Inhalte

Was ist angesagt?

A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...IJNSA Journal
 
Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesJavier González
 
LogMeIn Security White Paper
LogMeIn Security White PaperLogMeIn Security White Paper
LogMeIn Security White PaperLogMeIn
 
Defense-through-Deception Network Security Model: Securing University Campus ...
Defense-through-Deception Network Security Model: Securing University Campus ...Defense-through-Deception Network Security Model: Securing University Campus ...
Defense-through-Deception Network Security Model: Securing University Campus ...journalBEEI
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfslametarrokhim1
 
Mca5042 cryptography and network security (1)
Mca5042  cryptography and network security (1)Mca5042  cryptography and network security (1)
Mca5042 cryptography and network security (1)smumbahelp
 
Cross domain security reference architecture
Cross domain security reference architectureCross domain security reference architecture
Cross domain security reference architectureWen Zhu
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSForgeRock
 
Self Defending Network
Self Defending NetworkSelf Defending Network
Self Defending NetworkSwarna Gautam
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Jayanth Dwijesh H P
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)abhimanyubhogwan
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyManjunath G
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Global Business Events
 
RFC 7435 - Opportunistic security - Some protection most of the time
RFC 7435 - Opportunistic security - Some protection most of the timeRFC 7435 - Opportunistic security - Some protection most of the time
RFC 7435 - Opportunistic security - Some protection most of the timeOlle E Johansson
 
Security Event Analysis Through Correlation
Security Event Analysis Through CorrelationSecurity Event Analysis Through Correlation
Security Event Analysis Through CorrelationAnton Chuvakin
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 

Was ist angesagt? (20)

A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
 
cloud
cloudcloud
cloud
 
Security technology
Security technologySecurity technology
Security technology
 
Building Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal DevicesBuilding Trust Despite Digital Personal Devices
Building Trust Despite Digital Personal Devices
 
LogMeIn Security White Paper
LogMeIn Security White PaperLogMeIn Security White Paper
LogMeIn Security White Paper
 
Beating ips 34137
Beating ips 34137Beating ips 34137
Beating ips 34137
 
Defense-through-Deception Network Security Model: Securing University Campus ...
Defense-through-Deception Network Security Model: Securing University Campus ...Defense-through-Deception Network Security Model: Securing University Campus ...
Defense-through-Deception Network Security Model: Securing University Campus ...
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdfUnderstanding Cyber Attack - Cyber Kill Chain.pdf
Understanding Cyber Attack - Cyber Kill Chain.pdf
 
Mca5042 cryptography and network security (1)
Mca5042  cryptography and network security (1)Mca5042  cryptography and network security (1)
Mca5042 cryptography and network security (1)
 
Cross domain security reference architecture
Cross domain security reference architectureCross domain security reference architecture
Cross domain security reference architecture
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
 
Self Defending Network
Self Defending NetworkSelf Defending Network
Self Defending Network
 
Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)Network and cyber security module(15ec835, 17ec835)
Network and cyber security module(15ec835, 17ec835)
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Self defending networks
Self defending networksSelf defending networks
Self defending networks
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
 
RFC 7435 - Opportunistic security - Some protection most of the time
RFC 7435 - Opportunistic security - Some protection most of the timeRFC 7435 - Opportunistic security - Some protection most of the time
RFC 7435 - Opportunistic security - Some protection most of the time
 
Security Event Analysis Through Correlation
Security Event Analysis Through CorrelationSecurity Event Analysis Through Correlation
Security Event Analysis Through Correlation
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 

Ähnlich wie USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response Headers

CMS Website Security Threat Protection Oriented Analyzer System
CMS Website Security Threat Protection Oriented Analyzer SystemCMS Website Security Threat Protection Oriented Analyzer System
CMS Website Security Threat Protection Oriented Analyzer SystemEditor IJCATR
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Defensive coding practices is one of the most critical proactive s
Defensive coding practices is one of the most critical proactive sDefensive coding practices is one of the most critical proactive s
Defensive coding practices is one of the most critical proactive sLinaCovington707
 
Blueprint for Cyber Security Zone Modeling
Blueprint for Cyber Security Zone ModelingBlueprint for Cyber Security Zone Modeling
Blueprint for Cyber Security Zone ModelingITIIIndustries
 
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYSECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYijsrd.com
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architectureijsrd.com
 
High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...CSITiaesprime
 
CMST&210 Pillow talk Position 1 Why do you think you may.docx
CMST&210 Pillow talk Position 1 Why do you think you may.docxCMST&210 Pillow talk Position 1 Why do you think you may.docx
CMST&210 Pillow talk Position 1 Why do you think you may.docxmccormicknadine86
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesSymantec
 
Secure modelling schema of distributed information
Secure modelling schema of distributed informationSecure modelling schema of distributed information
Secure modelling schema of distributed informationiaemedu
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...iaemedu
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...iaemedu
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...iaemedu
 
Cloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityCloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityHari Kumar
 
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-HiChapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-HiEstelaJeffery653
 
منصة شليلة
منصة شليلةمنصة شليلة
منصة شليلةssuser81f53f
 
Secure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior
 

Ähnlich wie USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response Headers (20)

CMS Website Security Threat Protection Oriented Analyzer System
CMS Website Security Threat Protection Oriented Analyzer SystemCMS Website Security Threat Protection Oriented Analyzer System
CMS Website Security Threat Protection Oriented Analyzer System
 
Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Defensive coding practices is one of the most critical proactive s
Defensive coding practices is one of the most critical proactive sDefensive coding practices is one of the most critical proactive s
Defensive coding practices is one of the most critical proactive s
 
Blueprint for Cyber Security Zone Modeling
Blueprint for Cyber Security Zone ModelingBlueprint for Cyber Security Zone Modeling
Blueprint for Cyber Security Zone Modeling
 
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYSECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGY
 
Security and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud ArchitectureSecurity and Privacy Enhancing Multicloud Architecture
Security and Privacy Enhancing Multicloud Architecture
 
High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...
 
CMST&210 Pillow talk Position 1 Why do you think you may.docx
CMST&210 Pillow talk Position 1 Why do you think you may.docxCMST&210 Pillow talk Position 1 Why do you think you may.docx
CMST&210 Pillow talk Position 1 Why do you think you may.docx
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New VulnerabilitiesProtect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
 
Secure modelling schema of distributed information
Secure modelling schema of distributed informationSecure modelling schema of distributed information
Secure modelling schema of distributed information
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...
 
Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...Secure modelling schema of distributed information access management in cloud...
Secure modelling schema of distributed information access management in cloud...
 
Cloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityCloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls Security
 
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-HiChapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
Chapter 13Secure Network DesignCopyright © 2014 by McGraw-Hi
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
منصة شليلة
منصة شليلةمنصة شليلة
منصة شليلة
 
Secure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depthSecure Code Warrior - Defense in depth
Secure Code Warrior - Defense in depth
 

Mehr von Aditya K Sood

Emerging Trends in Online Social Networks Malware
Emerging Trends in Online Social Networks MalwareEmerging Trends in Online Social Networks Malware
Emerging Trends in Online Social Networks MalwareAditya K Sood
 
Enfilade: Tool to Detect Infections in MongoDB Instances
Enfilade: Tool to Detect Infections in MongoDB InstancesEnfilade: Tool to Detect Infections in MongoDB Instances
Enfilade: Tool to Detect Infections in MongoDB InstancesAditya K Sood
 
Detecting Ransomware/Bot Infections in Elasticsearch
Detecting Ransomware/Bot Infections in ElasticsearchDetecting Ransomware/Bot Infections in Elasticsearch
Detecting Ransomware/Bot Infections in ElasticsearchAditya K Sood
 
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...Aditya K Sood
 
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...Aditya K Sood
 
Network Security : Book Review : Targeted Cyber Attacks : Aditya K Sood
Network Security : Book Review : Targeted Cyber Attacks : Aditya K SoodNetwork Security : Book Review : Targeted Cyber Attacks : Aditya K Sood
Network Security : Book Review : Targeted Cyber Attacks : Aditya K SoodAditya K Sood
 
Abusing Glype Proxies - Attacks, Exploits and Defences
Abusing Glype Proxies - Attacks, Exploits and DefencesAbusing Glype Proxies - Attacks, Exploits and Defences
Abusing Glype Proxies - Attacks, Exploits and DefencesAditya K Sood
 
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin MagazineNIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin MagazineAditya K Sood
 
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...Aditya K Sood
 
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...Aditya K Sood
 
ToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android InfectionsToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android InfectionsAditya K Sood
 
DEF CON 20 - Botnets Die Hard - Owned and Operated
DEF CON 20 - Botnets Die Hard - Owned and OperatedDEF CON 20 - Botnets Die Hard - Owned and Operated
DEF CON 20 - Botnets Die Hard - Owned and OperatedAditya K Sood
 
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks Aditya K Sood
 
NGR Bot Analysis Paper
NGR Bot Analysis PaperNGR Bot Analysis Paper
NGR Bot Analysis PaperAditya K Sood
 
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...Aditya K Sood
 
Commercial Cyber Crime - Social Networks Malware
Commercial Cyber Crime - Social Networks MalwareCommercial Cyber Crime - Social Networks Malware
Commercial Cyber Crime - Social Networks MalwareAditya K Sood
 
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...Aditya K Sood
 
OWASP AppSec USA 2011 - Dismantling Web Malware
OWASP AppSec USA 2011 - Dismantling Web MalwareOWASP AppSec USA 2011 - Dismantling Web Malware
OWASP AppSec USA 2011 - Dismantling Web MalwareAditya K Sood
 
Browser Malware Taxonomy
Browser Malware TaxonomyBrowser Malware Taxonomy
Browser Malware TaxonomyAditya K Sood
 
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...Aditya K Sood
 

Mehr von Aditya K Sood (20)

Emerging Trends in Online Social Networks Malware
Emerging Trends in Online Social Networks MalwareEmerging Trends in Online Social Networks Malware
Emerging Trends in Online Social Networks Malware
 
Enfilade: Tool to Detect Infections in MongoDB Instances
Enfilade: Tool to Detect Infections in MongoDB InstancesEnfilade: Tool to Detect Infections in MongoDB Instances
Enfilade: Tool to Detect Infections in MongoDB Instances
 
Detecting Ransomware/Bot Infections in Elasticsearch
Detecting Ransomware/Bot Infections in ElasticsearchDetecting Ransomware/Bot Infections in Elasticsearch
Detecting Ransomware/Bot Infections in Elasticsearch
 
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
BlackHat 2014 Briefings - Exploiting Fundamental Weaknesses in Botnet C&C Pan...
 
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
BlackHat Arsenal 2014 - C-SCAD : Assessing Security Flaws in C-SCAD WebX Clie...
 
Network Security : Book Review : Targeted Cyber Attacks : Aditya K Sood
Network Security : Book Review : Targeted Cyber Attacks : Aditya K SoodNetwork Security : Book Review : Targeted Cyber Attacks : Aditya K Sood
Network Security : Book Review : Targeted Cyber Attacks : Aditya K Sood
 
Abusing Glype Proxies - Attacks, Exploits and Defences
Abusing Glype Proxies - Attacks, Exploits and DefencesAbusing Glype Proxies - Attacks, Exploits and Defences
Abusing Glype Proxies - Attacks, Exploits and Defences
 
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin MagazineNIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
NIframer - CPanel IFrame Injector (Bash based) - Virus Bulletin Magazine
 
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
 
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
BlackHat USA 2013 Arsenal - Sparty : A FrontPage and SharePoint Security Audi...
 
ToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android InfectionsToorCon 14 : Malandroid : The Crux of Android Infections
ToorCon 14 : Malandroid : The Crux of Android Infections
 
DEF CON 20 - Botnets Die Hard - Owned and Operated
DEF CON 20 - Botnets Die Hard - Owned and OperatedDEF CON 20 - Botnets Die Hard - Owned and Operated
DEF CON 20 - Botnets Die Hard - Owned and Operated
 
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
Hackers on Planet Earth (HOPE - 2012) Advancements in Botnet Attacks
 
NGR Bot Analysis Paper
NGR Bot Analysis PaperNGR Bot Analysis Paper
NGR Bot Analysis Paper
 
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
Virus bulletin 2011 Conference Paper - Browser Exploit Packs - Exploitation T...
 
Commercial Cyber Crime - Social Networks Malware
Commercial Cyber Crime - Social Networks MalwareCommercial Cyber Crime - Social Networks Malware
Commercial Cyber Crime - Social Networks Malware
 
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
Virus Bulletin 2011 Conference - Browser Exploit Packs - Death by Bundled Exp...
 
OWASP AppSec USA 2011 - Dismantling Web Malware
OWASP AppSec USA 2011 - Dismantling Web MalwareOWASP AppSec USA 2011 - Dismantling Web Malware
OWASP AppSec USA 2011 - Dismantling Web Malware
 
Browser Malware Taxonomy
Browser Malware TaxonomyBrowser Malware Taxonomy
Browser Malware Taxonomy
 
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
BruCon (Brussels 2011) Hacking Conference - Botnets and Browsers (Brothers in...
 

Kürzlich hochgeladen

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Kürzlich hochgeladen (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

USENIX CollSec 2010 - Conundrum of Declarative Security in HTTP Response Headers

  • 1. The Conundrum of Declarative Security HTTP Response Headers: Lessons Learned Aditya K Sood, Richard J. Enbody Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1226, USA soodadit@cse.msu.edu, enbody@cse.msu.edu Abstract part of the web server or application running on the server. In this way, declarative security provides both portable and flexible security defense. Most of these declarative The stringency of attacks has grown simultaneously with security protection parameters are not the part of HTTP the development of the web. To combat some of the new at- 1.1 specification, but are considered as vendor specific or tacks, declarative security has been proposed in the form customized security solutions related to a specific prod- of HTTP response headers from the server side. The uct. Usually, the declarative security in HTTP param- declarative model provides an extensible set of security eters is understood as the ”X” factor protection. Most parameters in form of HTTP responses. In this, browsers of the HTTP headers start with ”X” in order to differen- can respond with a requested security mechanism. This tiate between standard HTTP 1.1 and normalized ones. paper explores the state of HTTP declarative security and Some of the headers that define the declarative secu- how it is being applied today. rity are X-XSS-Protection, X-Frame-Options, X-Content- Type-Options, X-Download-Options, X-Content-Security- Policy, etc. Microsoft and Mozilla have adopted this type of security. We will describe declarative security and the 1 Introduction corresponding attacks in the next section in more detail. This paper aims to determine the state of declarative se- With the advent of new web attacks, protective strategies curity by testing the Alexa [11] top 1000 websites to find have had to adapt. The latest attacks such as Clickjack- the penetration of this type of security. In addition, we ing [1], XSS Filter bypassing, MIME sniffing [9] have will discuss some fallacies and problems with the declar- dramatically affected the World Wide Web community. ative security model and the lessons learned during this No doubt XSS has been the most exploited bug in ap- experiment. For our analysis, we will be covering a set of plications, but the new generation attacks such as Cross declarative protection headers which have been deployed Site Request Forging (CSRF), Clickjacking and so on to prevent the new attack trends on the web. have transformed the nature of exploitation. The new at- tack patterns require new type of security mechanisms be- cause of the vector of origination. New security solutions, named Declarative Security have been proposed and are 2 Applied Security Model applied at a low level in the HTTP. The main idea is to specify security in an HTTP parameter that is set by the According to the Microsoft’s applied security model server and is sent along to the web browser as a part of the [12,13], implementation of security can be either impera- in-line response. A browser renders the content of that tive or declarative. The security model is deployed based web page by scrutinizing the HTTP headers and tries to on the two factors as: invoke the specified security module in order to head off the attacks. • A security model is considered as declarative [12], if As the name implies, the protection parameters for a the security features are implemented in the applica- specific set of attack are declared by the developer as a tion as a parameter which is used at the run time. 1
  • 2. • A security model is considered as imperative [13] , if use differential techniques such as compressed frames as the security features such as permissions are allowed hidden or transparent, trapping mouse events [2], or UI to generate or invoke a new object based on the re- Redressing [3] primarily to trap the user. A number of quirements of the code. protection mechanisms have been implemented including frame bursting codes [4], or restricting the frame execu- tion. Microsoft introduced a protection feature in HTTP The major difference between these two security mod- headers as a part of declarative security. The X-FRAME- els is that imperative security is used to perform opera- OPTIONS [5] sets a restriction on the framing of a web tions based on the demands and overrides, whereas declar- page for a particular domain. It uses the value DENY ative security issues requests. Declarative security has the and SAMEORIGIN for rendering the contents into a child advantage that the ’request’ model allows easier integra- frame. It is possible to stop the rendering completely in tion within existing implementations as well as the flexi- a child frame using DENY as a parameter. The SAMEO- bility to adapt to new attacks. RIGIN parameter declares that the content can only come from the parent site and that no third party content render- ing is allowed. 3 HTTP Declarative Security Recent web attacks have proven to be difficult to handle in the real time. Examples include Clickjacking, MIME 3.1.2 CSRF and XSS Attacks: The advanced level of sniffing, manipulating file downloads, CSRF, and XSS Cross-Site Scripting (XSS) attacks in collaboration with variants. In response, the declarative security model has the Cross Site Request Forging (CSRF) has had a dra- been proposed. It uses an HTTP header that has to be de- matic impact on the World Wide Web. In order to protect clared on the server side by the developer or administra- against this attack, companies such as Mozilla and Mi- tor. The HTTP header triggers a response in the browser crosoft have introduced a declarative security parameter. to deploy requested security on the client side. Mozilla has introduced Content Security Policy (CSP) [6]. The CSP provides the HTTP header X-Content-Security- Browsers play a critical role in determining the suc- Policy which is defined by a particular site in order to cess of these types of attacks, so it is required that servers define the characteristics of the content to be rendered. and client browsers coordinate to fend off the attacks. To In particular, the header specifies what content can be facilitate coordination, browsers are modified to recog- trusted. To prevent reflective cross site scripting attacks, nize declarative security headers in HTTP headers sent Microsoft implemented a protection feature in the form of by servers. Once a declarative security HTTP header is HTTP header X-XSS-Protection[8]. If a website specifies detected, the browser will execute the requested secu- this HTTP header, the browser will trigger the XSS filter rity mechanism. Of course, if the server does not serve and stop the rendering of the content in Internet Explorer. up HTTP headers with declarative security parameters,no protection can be implemented. Similarly, if browsers cannot recognize the headers, no protection can be de- ployed. 3.1.3 MIME Scripting Attacks: An unrestricted con- tent type included from a third party can disrupt the ro- bustness of a web application resulting in security prob- 3.1 Types of Threats lems. There are a number of attacks that utilize the Content-Type header to replace specific content elements The HTTP header parameters are specific to particular with malicious code to be downloaded and rendered in types of attacks. Here we examine a set of attacks (and the browser. The malicious code gets executed in the con- protections) that can be specified in the headers. text of the domain which can result in stealing of data. Microsoft has introduced a protection feature in the form of HTTP header as X-Content-Type-Options [9] for sub- 3.1.1 Clickjacking Attacks: The clickjacking attacks verting the MIME sniffing attacks. The nosniff parameter [1] are a new class of attacks that use differential tech- stops the rendering of image as a MIME object and trans- niques to hide or obscure an element for trapping the user forms it into plain text format to avoid the execution of to visit destinations that he did not intend to visit. They scripts. 2
  • 3. 3.1.4 File downloading Scripting Attacks: These be determined only based on the deployed security solu- types of attacks are commonly used for exploitation. It tions. In addition, we have tested some popular websites is based on the fact that some browsers such as Internet that are not on the list. Explorer use inbuilt functionality to open the files directly from the domain while downloading . As a result, any We wrote a small PERL tool named x enum to ana- malicious file that opens directly from the domain results lyze websites. Since this experiment is entirely based on in untamed output which is a result of the scripts present the protection features implemented in HTTP headers, we in it. Microsoft has introduced a new protection feature as resorted to low level HTTP debugging to analyze the re- a part of its declarative security as X-Download-Options sponses. The tool is designed in two modules. The first [9] which stops the opening of the files directly from the module traps the responses and performs pattern match- domain. The browser removes the file-opening control ing to detect the presence of a particular security param- from the download box when it encounters a noopen pa- eter. The second module examines the behavior of HTTP rameter in the X-Download-Options as a part of the HTTP headers. Based on the output, we are able to determine response. the type of attack that is sanitized by the domain through these headers. The experiment is strictly based on the security that is 4 Experiment declared in the HTTP headers and does not cover the stan- dard security modules used on the client side. It is possi- ble to have a number of countermeasures for a particular What is the state of declarative security? Are servers attack, but this analysis only covers the security solutions making these declarations? Are clients responding? As implemented at a low level in the HTTP protocol. pointed out earlier, action is needed from both the server and client sides in order for this technique to work. 4.3 Results 4.1 Objectives The results indicate that very few websites out of the Here is a list of objectives that what we want to achieve: Alexa [11] top 1000 websites are using any of the declar- ative security headers when a request is initiated for the default web page and other linked pages at the time of 1. To determine how widely adopted declarative secu- testing. Out of the 1000 websites containing over 15,000 rity is for new attacks. pages, that were put to test, we have not detected any website that is using all the parameters. We also tried 2. To determine whether server softwares from different some intensive tests on the sub-domains and mail service vendors are using the solutions by default. providers on the popular websites such as Google, Yahoo, 3. To examine the effectiveness of the combined security Ebay, etc. solution between the client side and the server side. Table 2 shows the acceptance level of declarative secu- 4. To estimate the risks to the business in the online rity in HTTP response headers in the top 1000 websites. world. A ”Yes” indicates that at least one type of declarative se- curity header was used. Only one site out of the top 25 uses any declarative security headers and only 7 of the top 25 use headers. Overall, only 8 of the top 1000 use any 4.2 Testbed declarative security headers. At the bottom of the table we have included a few security-oriented sites to indicate For our experiment, we used Alexa [11] for a list of the that usage does exist outside the top 25. top 1000 websites across a number of different domains. Since their ranking is based on web traffic we will be ex- Table 1 shows the applied declarative security by amining sites that are not only popular, but also attractive different web servers that are mostly used in top 1000 to malicious users. The number of users associated with domains ranked by Alexa. We have looked at the type a specific domain indicates the severity of risk and ex- of web servers that are used extensively. There is a ploitation if an attack happens. The protection factor can possibility of existence of different web servers apart 3
  • 4. Web Server Headers Rank Website Server Headers GSE Yes 1 google.com GSE 2.0 Yes Apache/1.3.41.fb2 None 2 facebook.com Apache/1.3.41.fb2 None Apache Yes 3 youtube.com Apache Yes YTS None 4 yahoo.com YTS/1.18.4 None MS-IIS None 5 live.com MS-IIS/7.0 None Sun-JS-Web-Server None 6 wikipedia.org Sun-JS-Web-Server/7.0 None sffe Yes 7 baidu.com BWS/1.0 None Apache-Coyote None 8 blogger.com sffe Yes Server None 9 msn.com Microsoft-IIS/6.0 None GFE 2.0 Yes 10 qq.com nginx/0.6.39 None BWS/1.0 None 11 twitter.com Apache, hi None Resin/2.1.17 None 12 yahoo.co.jp YTS/1.16.4 None Ning HTTP Server 2.0 None 13 google.co.in GWS Yes nginx None 14 taobao.com Apache None IBM HTTP Server None 15 google.de GWS Yes KONICHIWA/1.0 None 16 google.com.hk GWS Yes Cafe Yes 17 wordpress.com nginx None AmazonS3 Yes 18 sina.com.cn Apache/2.0.54 (Unix) None 19 google.co.uk GWS None Table 1: Types of Web servers used in the top 1000 Web- 20 amazon.com Server None sites and their declarative security header usage. 21 myspace.com MS-IIS/7.5 None 22 microsoft.com MS-IIS/7.5 None 23 google.fr GWS Yes from the web servers listed in the Table 1. The Google’s 24 bing.com Microsoft-IIS/6.0 None 25 ebay.com Apache-Coyote/1.1 None GSE server is using most of HTTP header protection ... parameters during monetary transactions. This has been 62 orkut.com GFE 2.0 Yes noticed in Gmail and Google checkout sub-domain. The ... response is evaluated as 1000+ adsense.google.com Cafe Yes 1000+ gmail.com GSE 2.0 Yes HTTP/1.1 200 OK 1000+ ha.ckers.org Apache Yes Cache-Control: no-cache, no-store, max-age=0 1000+ noscript.net Apache Yes Pragma: no-cache 1000+ flashgot.net Apache Yes Expires: Fri, 01 Jan 1990 00:00:00 GMT 1000+ eyeviewdigital.com AmazonS3 Yes Date: Wed, 14 Apr 2010 19:46:54 GMT Content-Type: text/html; charset=UTF-8 Table 2: Applied declarative security as HTTP response Set-Cookie: [Cookie value is truncated] headers in top 1000 websites. X-Content-Type-Options: nosniff X-Frame-Options: SAMEORIGIN X-XSS-Protection: 1; mode=block Blogger’s sffe server also implement this option. Server: GSE The Facebook Apache/1.3.41.fb2 , Twitter’s Apache The Yahoo Traffic Server (YTS), used for Yahoo mail and Server hi , MySpace’s Microsoft IIS 7.5 servers do and other service websites, does not provide any signs of not indicate usage of declarative parameters, but Orkut’s usage of declarative security. The Rediff Apache Server GFE 2.0 server uses X-XSS-Protection:0 as one of the re- and Microsoft IIS 6.0/7.0 used for Rediffmail and Hotmail sponse header. Further, Orkut uses GSE server for collab- respectively, are completely ignoring the HTTP header orative work. Popular websites such as NetFlix, Flickr, protection parameters. The s0.2mdn.net and *.ytimg.com Ning, Photobucket, Linkedin, Internet Movie Database hosts images and flash files that are used in major websites (IMDb), Paypal, Skype are not using declarative security such as Youtube, Amazon, Hotmail etc. for advertisement specific HTTP response headers. purposes. It uses X-Content-Type-Options:nosniff in its responses for preventing MIME sniffing. The Youtube’s Further, we looked at a number of websites having a Apache server, Google Advertisement Cafe server and high page rank apart from the top 1000 list from Alexa 4
  • 5. [11]. We noticed that some of the websites that are in HTTP headers. Declarative security appears to be ”Se- popular in the security community provide us with some curity by Choice”. On the other hand, many open source good signs. The ha.ckers.org, noscript.net, flashgot.net web servers have not implemented these security solu- shows the use of declarative security as: tions by default. HTTP/1.1 200 OK Date: Thu, 15 Apr 2010 17:45:28 GMT 5.3 Our analysis has shown that awareness may be a Server: Apache roadblock in the effective development of an optimal se- Content-Script-Type: text/javascript curity solution. Looking at the results, we speculate that X-FRAME-OPTIONS: SAMEORIGIN there are three main issues that impact the awareness. The X-XSS-Protection: 0 first one may be that the developers are not well educated Vary: Accept-Encoding,User-Agent about the existence of the new types of web attacks. In Connection: close the absence of awareness about the attacks, it is hard to Content-Type: text/html; charset=UTF-8 expect an appropriate and robust solution to be deployed. Second, changes are required in a huge number of web applications and the deployed hosting infrastructure to In summary, we have not seen much variations as few strengthen the security. Third, a problem may lie in the commercial websites include any HTTP headers that con- acceptance of these solutions as being robust. For exam- tain the specific set of declarative security parameters. We ple, most of the HTTP header based solutions are vulner- noticed that even some of the most popular and recog- able to classic HTTP Response Splitting [10] attacks, but nized security companies, banks, and organizations have these can be circumvented by applying additional security not adopted this solution. It appears that declarative secu- measures. rity is not widely implemented on the server side. 5.4 A declarative solution requires participation of both 5 Lessons Learned the server and the client. If either is not participating, no security action is taken. From our results, it is apparent that there is little participation on the server side so the During the course of this testing, we did not encounter risk of these web attacks remains high. any serious problems, but there were certain issues that made the testing a time consuming process. The handling and generation of responses depend a lot on the nature and 5.5 While we found that the declarative security solu- design of web application including configuration of the tions are not widely implemented, we have noticed some web server. During our research, websites using HTTP to evidence of acceptance of declarative security in security- HTTPS redirection produced long delays in the responses oriented sites. and even experienced hanging of processes. We found that different web servers handle the request differently and hence showed differential behavior in their response. A lot of variance has been noticed during the course of this 6 Conclusion and Future Work experiment. In the end, with the appropriate manual effort and automated solutions, the tests have been completed We have taken a look at one of the issue of getting an op- successfully. We conclude: tional security mechanism embedded in HTTP response headers: adoption. A declarative solution requires partici- pation of both the server and the client. There are pros and 5.1 The main commercial web servers, such as IIS cons of such a protocol. An advantage is that if few major and IBM HTTP SERVER, have not implemented attack- browsers implement the client side, the burden then falls specific HTTP headers in their default responses. on the server side. However, the downside is the same: the burden is now on the server side, and that is where we find ourselves. 5.2 Our analysis shows that websites running open and customized web servers such as Apache, GWE, GWS, Briefly, some browsers have it, but few servers are Cafe are the only ones deploying the security parameters serving it. In this case, half a solution is no solution, but 5
  • 6. it is early in the game. [12] MSDN - Microsoft Declarative Security Model. http://msdn.microsoft.com/enus/library/kaacwy28.aspx Once both servers and clients are fully compliant, the open question becomes: how effective will declarative [13] MSDN - Microsoft Imperative Security Model. headers be to circumvent this class of attack? There is http://msdn.microsoft.com/enus/library/0xkh23z7.aspx hope that the flexibility of this approach may allow fast response to any weaknesses. [14] SecNiche Security - http://www.secniche.org Finally, if this approach proves to be successful, what [15] Armorize Technologies - http://www.armorize.com other classes of attack will this be appropriate for? Acknowledgment: A sincere thanks to SecNiche Secu- rity [14] and Armorize [15] for supporting and giving me enough time to pursue work of this kind. 7 References [1] Clickjacking - Robert R Hansen and Jeremiah Gross- man. http://sectheory.com/clickjacking.htm, 2009 [2] Blog Article - More towards Clickjacking, Aditya K Sood. http://zeroknock.blogspot.com/2009/02/more- towards-clickjacking-simulating.html, 2009 [3] Browser Security Handbook- UI Redressing. http://code.google.com/p/browsersec/wiki/Part2 [4] Frame Bursting Technique. Source Wikipedia - http://en.wikipedia.org/wiki/Framekiller [5] Blog Article - ClickJacking Protection Feature. http://blogs.msdn.com/ie/archive/2009/01/27/ie8- security-part-vii-clickjacking-defenses.aspx [6] Complete Details - Content Security Policy. ˜ http://people.mozilla.org/bsterne/content-security- policy/details.html [7] Specification Details - Content Security Policy. https://wiki.mozilla.org/Security/CSP/Spec [8] XSS Filter Details - Reflected XSS Protec- tion. http://blogs.msdn.com/ie/archive/2008/07/01/ie8- security-part-iv-the-xss-filter.aspx [9] IE Blog - Comprehensive Protection Parame- ters http://blogs.msdn.com/ie/archive/2008/07/02/ie8- security-part-v-comprehensive-protection.aspx [10] Details about HTTP Response Splitting Attacks. http://www.securiteam.com/securityreviews/5WP0E2KFGK.html [11] Alexa Top Sites. http://www.alexa.com/topsites 6