IS542: Web Service Security and Privacy
The course provides in-depth studies of numerous attacks and defenses in web & mobile services. The course covers comprehensive security vulnerabilities / privacy risks in Web and Android mobile applications. We will also discuss how to detect and avoid such vulnerabilities and risks.
Basic Information
- Lecture: Tuesday/Thursday 13:00 - 14:30, Room 102 N1
- Instructor: Sooel Son
- Email: sl.son (at) kaist.ac.kr
- Homepage: https://sites.google.com/site/ssonkaist/
- Office: Room 2312 N5
- Office hours: Thursday 14:30 - 15:30, Room 2312 N5
- T.A.:
- Suyoung Lee: suyoung.lee (at) kaist.ac.kr
Evaluation
- Attendance/Participation: 5%
- Midterm exam: 20%
- Homework: 15%
- Presentation: 10%
- Project: 50%
Schedule
-
3/2 Course Introduction
- 3/4 Web programmging
- Group project announced
- 3/9 Server-side Web attacks(1)
- Reading materials
N. Jovanovic et al. Pixy: a static analysis tool for detecting Web application vulnerabilities (S&P 2006) S. Bandhakavi et al. CANDID: preventing sql injection attacks using dynamic candidate evaluations (CCS 2007) Son et al. "Diglossia: Detecting Code-Injection Attacks with Precision and Efficiency" (CCS 2013) Ray et al. "Defining Code-injection Attacks" (POPL 2012)
- Reading materials
- 3/11 Server-side Web attacks(2)
- Team selection due 3/26 (2 persons for one team)
- 3/16 Cross-site Scripting (1)
- Reading materials
Zalewski. "Postcards from the Post-XSS World" (2011) S. Lekis et al. 25 million flows later: large-scale detection of DOM-based XSS (CCS 2013)
- HW #1 will be posted!
- Reading materials
-
3/18 Cross-site Scripting (2)
- 3/23 Content Security Policy
- Reading materials
L. Weichselbaum et al. CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security Policy, (CCS 2016) A. Doupe et al. deDacota: Toward Preventing Server-Side XSS via Automatic Code and Data Separation (CCS 2013)
- Reading materials
- 3/25 CSRF
- Reading materials
A. Barth et al. Robust Defenses for Cross-Site Request Forgery, (CCS 2008)
- Reading materials
- 3/30 Clickjacking
- Reading materials
Huang et al. Clickjacking: Attacks and Defenses (Usenix Security 2012) Rydstedt et al. Busting frame busting: a study of clickjacking vulnerabilities at popular sites (W2SP 2010)
- HW #1 deadline!
- Reading materials
- 4/1 Browser extensions
- Reading materials
A. Kapravelos et al. Hulk: Eliciting Malicious Behavior in Browser Extensions, (USENIX 2014) Thomas et al. Ad Injection at Scale: Assessing Deceptive Advertisement Modifications (S&P 2015) Jagpal et al. Trends and Lessons from Three Years Fighting Malicious Extensions (USENIX 2015)
- Reading materials
- 4/6 Phishing & Spam
- Reading materials
Jagatic et al. Social Phishing, (Communication of ACM, 2007)
- Reading materials
- 4/8 Password & Two-factor Auth (1)
- Reading materials
Bonneau et al. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes (S&P 2012). Bonneau. The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords (S&P 2012) Universal 2nd Factor (U2F) Overview (FIDO Alliance Proposed Standard, 2015)
- Project proposal deadline!
- Reading materials
-
4/13 Password & Two-factor Auth (2)
- 4/15 HTTPS (1)
- Reading materials
Sotirov et al. Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate (CRYPTO 2009) Lenstra et al. Ron was Wrong, Whit is Right (CRYPTO 2012). Adrian et al. Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice (CCS 2015)
- Reading materials
- 4/20
- Midterm
- 4/22
- Midterm
-
4/27 HTTPS (2)
-
4/29 No class
-
5/4 Midterm Presentation
- 5/6 Android Web Security (1)
- Reading materials
Enck et al. Understanding Android Security (S&P 2009) Felt et al. Android Permissions Demystified (CCS 2011) Enck et al. A Study of Android Application Security (Usenix 2011)
- Reading materials
-
5/11 Android Web Security (2)
- 5/13 Student Presentation
- Reading materials
[박용현] Karami et al. Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage (NDSS 2021) [이용화] Drakonakis et al. The Cookie Hunter: Automated Black-box Auditing for Web Authentication and Authorization Flaws (CCS 2020)
- Reading materials
- 5/18 Student Presentation
- Reading materials
[김호영] Vishwamitra et al. Towards Understanding and Detecting Cyberbullying in Real-world Images (NDSS 2021) [송원호] Ye et al. Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach (CCS 2018)
- Reading materials
- 5/20 Student Presentation
- Reading materials
[김준겸] William et al. Riding out DOMsday: Toward Detecting and Preventing DOM Cross-Site Scripting (NDSS 2018) [T.A.] Steffens et al. PMForce: Systematically Analyzing postMessage Handlers at Scale (CCS 2020)
- Reading materials
- 5/25 Webtracking & Fingerprinting (1)
- Reading materials
Mowery and Shacham. Pixel Perfect: Fingerprinting Canvas in HTML5 (W2SP 2012) Acar et al. The Web Never Forgets: Persistent Tracking Mechanisms in the Wild (CCS 2014)
- Reading materials
-
5/27 Webtracking & Fingerprinting (2)
-
6/1 K-anonymity & Differential Privacy
-
6/3 Differential Privacy
-
6/8 Final Project Presentation (1)
-
6/10 Final Project Presentation (2) & Wrap-up
- 6/17
- Deadline for your final course project report