ericc1_ECE_2015.pdf (1.01 MB)
Protecting Incorrectly Implemented Web Applications From Online Adversaries
thesis
posted on 2015-07-01, 00:00 authored by Eric Y. ChenImplementation errors are commonly found in modern web applications. They can be caused by a multitude of factors, including weaknesses in browsers' security policies and
developers' misinterpretations of web protocols (e.g., OAuth and OpenId). In this thesis, we show that even under the assumption that web applications are implemented incorrectly, their security can be improved through two fronts: 1) Enhancing the application isolation mechanism of web browsers, and 2) securing inter-application
communication protocols via program verification. For 1), we created a mechanism called pp Isolation to enhance isolation boundaries of web applications running inside a browser. For 2), we created a formal verification framework called Certication of Symbolic Transaction (CST) that verifies the security properties of every web transaction on-the-
y by
invoking static verication at runtime. The threat model we consider in this thesis is the
standard web attacker with additional capabilities of a malicious user.
The two defenses proposed in this thesis are lightweight and backward compatible.
App Isolation can be deployed as an opt-in feature for websites; and we have applied CST
to ve commercially deployed applications to secure APIs from well-known companies
including Facebook, Amazon, PayPal, and Microsoft.
i
developers' misinterpretations of web protocols (e.g., OAuth and OpenId). In this thesis, we show that even under the assumption that web applications are implemented incorrectly, their security can be improved through two fronts: 1) Enhancing the application isolation mechanism of web browsers, and 2) securing inter-application
communication protocols via program verification. For 1), we created a mechanism called pp Isolation to enhance isolation boundaries of web applications running inside a browser. For 2), we created a formal verification framework called Certication of Symbolic Transaction (CST) that verifies the security properties of every web transaction on-the-
y by
invoking static verication at runtime. The threat model we consider in this thesis is the
standard web attacker with additional capabilities of a malicious user.
The two defenses proposed in this thesis are lightweight and backward compatible.
App Isolation can be deployed as an opt-in feature for websites; and we have applied CST
to ve commercially deployed applications to secure APIs from well-known companies
including Facebook, Amazon, PayPal, and Microsoft.
i
History
Date
2015-07-01Degree Type
- Dissertation
Department
- Electrical and Computer Engineering
Degree Name
- Doctor of Philosophy (PhD)