Talks and Poster Presentations (with Proceedings-Entry):
N. Jovanovic, E. Kirda, Ch. Krügel:
"Preventing Cross Site Request Forgery Attacks";
Talk: SecureComm 2006,
Baltimore, MD, USA;
- 2006-09-01; in: "2nd International Conference on Security and Privacy in Communication Networks & the Workshops",
The web has become an indispensable part of our lives. Unfortunately, as our dependency on the web increases, so does the interst of attackers in exploiting web applications and web-based information systems. Previous work in the field of web application security has mainly focused on the mitigation of Cross Site Scripting (XSS) and SQL injection attacks. In contrast, Cross Site Request Forgery (XSRF) attacks have not received much attention. In an XSRF attak, the trust of a web application in its authenticated users is exploited by letting the attacker make arbitrary HTTP requests on behalf of a victim user. The problem is that web applications typically act upon such requests without verifying that the performed actions are indeed intentional. Because XSRF is a relatively new security problem, it is largely unknown by web application developers. As a result, there exists many web applications that are vunerable to XSRF. Unfortunately, existing mitigation approaches are time-consuming and error-prone, as they require manual effort to integrate defense techniques into existing systems. In this paper, we present a solution that provides a completely automatic protection from XSRF attacks. More precisely, our approach is based on a server-side proxy that detects and prevents XSRF attacks in a way that is transparent to users as well as to the web application itself. We provide experimental results that demonstrate that we can use our prototypa to secure a number of popular open-source web applications, without negatively affecting their behaviour.
Created from the Publication Database of the Vienna University of Technology.