Interactive History Sniffing with Dynamically-Generated QR Codes and CSS Difference Blending

K. O’Neal, Scott Yilek
{"title":"Interactive History Sniffing with Dynamically-Generated QR Codes and CSS Difference Blending","authors":"K. O’Neal, Scott Yilek","doi":"10.1109/spw54247.2022.9833863","DOIUrl":null,"url":null,"abstract":"In a user-assisted history sniffing attack, first introduced by Weinberg, Chen, Jayaraman, and Jackson, a web site user can be tricked into revealing portions of their browsing history by performing an interactive task, like solving a CAPTCHA puzzle, that is dynamically generated based on the sites they have recently visited. Unlike automated history sniffing attacks, which often can probe 1000s of sites in a user’s browsing history, such user-assisted attacks have typically been limited to probing a much smaller number of sites.In this paper, we introduce a new user-assisted history sniffing attack based on malicious QR codes. These dynamically-generated QR codes allow a malicious site to probe thousands of links from a victim user’s browsing history. Generating these malicious QR codes based on the user’s history turns out to be challenging due to the required error-correcting properties. To overcome this issue, we show how to use a recent browser feature, CSS difference blending, to simulate an exclusive-OR of the dots in a QR code and correctly generate the error-correcting bits. This method of dynamically generating a valid QR code based on private user data may be of independent interest. Our results provide further evidence that the history sniffing defenses recently proposed by Smith, Disselkoen, Narayan, Brown, and Stefan should be seriously considered by browser vendors.","PeriodicalId":334852,"journal":{"name":"2022 IEEE Security and Privacy Workshops (SPW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE Security and Privacy Workshops (SPW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/spw54247.2022.9833863","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

In a user-assisted history sniffing attack, first introduced by Weinberg, Chen, Jayaraman, and Jackson, a web site user can be tricked into revealing portions of their browsing history by performing an interactive task, like solving a CAPTCHA puzzle, that is dynamically generated based on the sites they have recently visited. Unlike automated history sniffing attacks, which often can probe 1000s of sites in a user’s browsing history, such user-assisted attacks have typically been limited to probing a much smaller number of sites.In this paper, we introduce a new user-assisted history sniffing attack based on malicious QR codes. These dynamically-generated QR codes allow a malicious site to probe thousands of links from a victim user’s browsing history. Generating these malicious QR codes based on the user’s history turns out to be challenging due to the required error-correcting properties. To overcome this issue, we show how to use a recent browser feature, CSS difference blending, to simulate an exclusive-OR of the dots in a QR code and correctly generate the error-correcting bits. This method of dynamically generating a valid QR code based on private user data may be of independent interest. Our results provide further evidence that the history sniffing defenses recently proposed by Smith, Disselkoen, Narayan, Brown, and Stefan should be seriously considered by browser vendors.
交互式历史嗅探与动态生成的QR码和CSS差异混合
在由Weinberg、Chen、Jayaraman和Jackson首先提出的用户辅助历史嗅探攻击中,网站用户可以通过执行交互式任务(如解决CAPTCHA谜题)来诱骗其透露部分浏览历史,这是基于他们最近访问过的网站动态生成的。与自动历史嗅探攻击不同,自动历史嗅探攻击通常可以探测用户浏览历史中的数千个站点,而这种用户辅助攻击通常仅限于探测数量少得多的站点。本文提出了一种基于恶意QR码的用户辅助历史嗅探攻击方法。这些动态生成的QR码允许恶意网站探测受害者用户浏览历史中的数千个链接。由于需要纠错功能,根据用户的历史记录生成这些恶意QR码非常具有挑战性。为了克服这个问题,我们展示了如何使用最新的浏览器功能,CSS差异混合,来模拟QR码中点的异或,并正确生成纠错位。这种基于私人用户数据动态生成有效QR码的方法可能是独立的兴趣。我们的结果提供了进一步的证据,表明最近由Smith、Disselkoen、Narayan、Brown和Stefan提出的历史嗅探防御应该被浏览器供应商认真考虑。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信