Abstract/Details

Digital Duality: Exploring the Privacy and Security Threats of Modern Web Browsers

Lin, Xu.   University of Illinois at Chicago ProQuest Dissertations & Theses,  2024. 31496182.

Abstract (summary)

In today’s interconnected world, the Web has become an integral part of our daily lives, with web browsers serving as the central hub of our digital existence. While the continuous enhancement of modern browser functionalities and APIs improves the user experience, it also opens the door to new and potential security vulnerabilities and privacy breaches. Our objective is to investigate the security and privacy threats posed by modern web technologies, explore the corresponding countermeasures, and emphasize the importance of comprehensive security assessments before deploying new web features. This dissertation focuses on autofill functionality and browser fingerprinting. The former is a browser feature, and the latter is a series of techniques that leverage browser features. While both lead to privacy violations, they present distinct challenges and implications. The autofill functionality, designed for user convenience, allows a novel side-channel attack for stealthy data extraction. In contrast, browser fingerprinting, despite their privacy concerns, is leveraged for augmenting authentication, which inadvertently results in account compromises.

First, the dissertation explores the privacy threats of browser autofill functionality. We develop a series of new techniques for concealing the presence of form elements that allow us to obtain sensitive user information while bypassing existing browser defenses. Subsequently, our in-depth investigation reveals a series of flaws and idiosyncrasies, which we exploit through a series of novel attack vectors that target specific aspects of browsers’ behavior. By chaining these together we are able to demonstrate a novel invasive side-channel attack that exploits autofill preview functionality for inferring sensitive information even when users choose not to utilize autofill. This attack affects all major Chromium-based browsers and allows attackers to probe users’ autofill profiles for over a hundred thousand candidate values (e.g., credit card and phone numbers). 

Browser fingerprinting is a more complex aggregation of features that is widely used for online tracking at the price of user privacy. While browser fingerprinting is traditionally dependent on JavaScript, we explore a new dimension of the tracking techniques, demonstrating how it can be achieved without using any JavaScript APIs. We develop a novel fingerprinting system that relies exclusively on CSS features and implicitly infers system characteristics, through carefully constructed and arranged HTML elements. We empirically demonstrate our system’s effectiveness against privacy-focused browsers (e.g., Safari, Firefox, Brave, Tor) and popular privacy-preserving extensions. We also conduct a pilot study within the IBM Research Intranet network and find that our system is comparable to a state-of-the-art JavaScript-based fingerprinting library at distinguishing devices, while outperforming it against browsers with anti-fingerprinting defenses. Our work highlights an additional dimension of the significant challenge posed by browser fingerprinting, and reaffirms the need for more robust detection systems and countermeasures.

While browser fingerprinting is often associated with privacy concerns, it has been incorporated into the authentication workflow of major services as part of their decision-making process for triggering additional security mechanisms. However, the inherent characteristics of browser fingerprints that render them an attractive authentication-augmenting factor also lend them to being used against the authentication process itself. We present a comprehensive and in-depth exploration of the security implications of real-world systems relying on browser fingerprints for authentication. Subsequently, we demonstrate how phishing attackers can replicate users’ fingerprints on different devices to deceive the risk-based authentication systems of high-value web services (e.g., cryptocurrency trading) to completely bypass two-factor authentication. Our analysis of phishing websites reveals a worrying trend: an increasing number of phishing sites targeting certain financial institutions are collecting all the necessary fingerprinting attributes to perform our attacks. 

Indexing (details)


Subject
Web studies;
Computer engineering;
Computer science
Classification
0646: Internet and social media studies
0984: Computer science
0464: Computer Engineering
Identifier / keyword
Web security; Web authentication; Browser fingerprinting; Form autofill; Privacy
Title
Digital Duality: Exploring the Privacy and Security Threats of Modern Web Browsers
Author
Lin, Xu
Number of pages
159
Publication year
2024
Degree date
2024
School code
0799
Source
DAI-A 85/12(E), Dissertation Abstracts International
ISBN
9798382952130
Advisor
Polakis, Jason
Committee member
Kanich, Chris; Solworth, Jon A.; Nikiforakis, Nick; Kapravelos, Alexandros
University/institution
University of Illinois at Chicago
Department
Computer Science
University location
United States -- Illinois
Degree
Ph.D.
Source type
Dissertation or Thesis
Language
English
Document type
Dissertation/Thesis
Dissertation/thesis number
31496182
ProQuest document ID
3075562291
Copyright
Database copyright ProQuest LLC; ProQuest does not claim copyright in the individual underlying works.
Document URL
https://www.proquest.com/docview/3075562291/abstract/