IS542: Web Service Security and Privacy
The course provides in-depth studies of numerous web attacks and defenses. The course covers comprehensive security vulnerabilities and privacy risks that exist on the Web. We will also discuss how to detect those vulnerabilities and alleviate the privacy risks.
Basic Information
- Lecture: Tuesday/Thursday 10:30 - 11:45, Room 3445 E3-1
- Instructor: Sooel Son
- Email: sl.son (at) kaist.ac.kr
- Homepage: https://sites.google.com/site/ssonkaist/
- Office hours: Thursday 13:00 - 14:00, Room 4434
- T.A.:
Evaluation
- Attendance/Participation: 5%
- Midterm exam: 20%
- Homework: 15%
- Presentation: 20%
- Project: 40%
Schedule
-
8/30 Course Introduction
- 9/1 Web programmging
- Group project announced
- 9/6 Server-side Web attacks(1)
- Reading materials
N. Jovanovic et al. Pixy: a static analysis tool for detecting Web application vulnerabilities (S&P 2006) S. Bandhakavi et al. CANDID: preventing sql injection attacks using dynamic candidate evaluations (CCS 2007) Son et al. "Diglossia: Detecting Code-Injection Attacks with Precision and Efficiency" (CCS 2013) Ray et al. "Defining Code-injection Attacks" (POPL 2012)
- Reading materials
-
9/8 Server-side Web attacks(2)
- 9/13 Cross-site Scripting (1)
- Reading materials
Zalewski. "Postcards from the Post-XSS World" (2011) S. Lekis et al. 25 million flows later: large-scale detection of DOM-based XSS (CCS 2013)
- Team selection due 9/13 (2 persons for one team)
- Reading materials
-
9/15 Cross-site Scripting (2)
- 9/20 Content Security Policy
- Reading materials
L. Weichselbaum et al. CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security Policy, (CCS 2016) A. Doupe et al. deDacota: Toward Preventing Server-Side XSS via Automatic Code and Data Separation (CCS 2013)
- Reading materials
- 9/22 CSRF
- Reading materials
A. Barth et al. Robust Defenses for Cross-Site Request Forgery, (CCS 2008)
- Reading materials
- 9/27 Clickjacking & Browser extensions
- Reading materials
Huang et al. Clickjacking: Attacks and Defenses (Usenix Security 2012) Rydstedt et al. Busting frame busting: a study of clickjacking vulnerabilities at popular sites (W2SP 2010) A. Kapravelos et al. Hulk: Eliciting Malicious Behavior in Browser Extensions, (USENIX 2014) Thomas et al. Ad Injection at Scale: Assessing Deceptive Advertisement Modifications (S&P 2015) Jagpal et al. Trends and Lessons from Three Years Fighting Malicious Extensions (USENIX 2015)
- Reading materials
- 9/29 Phishing & Spam
- Reading materials
Jagatic et al. Social Phishing, (Communication of ACM, 2007)
- Reading materials
-
10/4 No class
- 10/6 Password & Two-factor Auth (1)
- Reading materials
Bonneau et al. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes (S&P 2012). Bonneau. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords (S&P 2012) Universal 2nd Factor (U2F) Overview (FIDO Alliance Proposed Standard, 2015)
- Reading materials
-
10/11 Password & Two-factor Auth (2)
- 10/13 HTTPS
- Reading materials
Sotirov et al. Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate (CRYPTO 2009) Lenstra et al. Ron was Wrong, Whit is Right (CRYPTO 2012). Adrian et al. Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice (CCS 2015)
- Reading materials
- 10/18
- Midterm
- 10/20
- Midterm
-
10/25 Tracking
- 10/27 Student Presentation - XSS
- Reading materials
- Presenter: Hobin Kim
Lekis et al. 25 Million Flows Later - Large-scale Detection of DOM-based XSS, in: CCS. (CCS 2013)
- Presenter: Yeongbin Hwang
Steffens et al. PMForce: Systematically Analyzing postMessage Handlers at Scale (CCS 2020)
- 11/1 Student Presentation - Object injection
- Reading materials
- Presenter: Hyeon Heo
SerialDetector: Principled and Practical Exploration of Object Injection Vulnerabilities for the Web (NDSS 2021)
- Presenter: BeomSoo Kim
FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities. (USENIX 2022)
- 11/3 Student Presentation - Web attacks
- Reading materials
- Presenter: Junyoung Park
Karami et al. Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage (NDSS 2021)
- Presenter: Wonyoung Jung
Drakonakis et al. The Cookie Hunter: Automated Black-box Auditing for Web Authentication and Authorization Flaws (CCS 2020)
- 11/8 Student Presentation - CSP & Web attacks
- Reading materials
- Presenter: Kiwon Chung
It's Not What It Looks Like: Manipulating Perceptual Hashing based Applications (CCS 2021)
- Presenter: Hoyoung Jeong
Reverse Attack: Black-box Attacks on Collaborative Recommendation (CCS 2021)
- 11/10 Student Presentation - Phishing
- Reading materials
- Presenter: Bastien Schoonaert
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale (USENIX 2020)
- 11/15 Student Presentation - Phishing
- Reading materials
- Presenter: Mintae Kim
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing (S&P 2021)
- Presenter: Olav Lamberts
Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits (CCS 2021)
- 11/17 Student Presentation - Mobile web security
- Reading materials
- Presenter: Marion Le Béchec
Understanding Worldwide Private Information Collection on Android (NDSSS 2021)
- Presenter: Sophie Schuele
Identity Confusion in WebView-based Mobile App-in-app Ecosystems (USENIX 2022)
- 11/22 Student Presentation - Tracking & Ad
- Reading materials
- Presenter: Dongwon Shin
Iqbal et al. AdGraph: A Graph-Based Approach to Ad and Tracker Blocking
- Presenter: Guillaume DAVY
PhishTime: Continuous Longitudinal Measurement of the Effectiveness of Anti-phishing Blacklists (USENIX 2020)
- 11/24 Student Presentation - Fingerprinting
- Reading materials
- Presenter: Haein Lee
The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions (USENIX 2022)
- Presenter: Sooel Son
HearMeOut: Detecting Voice Phishing Activities in Android (MobiSys 2022)
- 11/29 Student Presentation - Tracking measurement
- Reading materials
- Presenter: Timothé Pitault
Acar et al. The Web Never Forgets: Persistent Tracking Mechanisms in the Wild (CCS 2014)
- Presenter: Sanggu Han
Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World (USENIX 2022)
-
12/1 No class
-
12/6 Final Project Presentation (1)
-
12/8 Final Project Presentation (2) & Wrap-up
- 12/13
- Deadline for your final course project report