Using Replicated Execution for a More Secure and Reliable Web Browser

Total Page:16

File Type:pdf, Size:1020Kb

Using Replicated Execution for a More Secure and Reliable Web Browser Using Replicated Execution for a More Secure and Reliable Web Browser Hui Xue Nathan Dautenhahn Samuel T. King University of Illinois at Urbana Champaign huixue2, dautenh1, kingst @uiuc.edu { } Abstract Unfortunately, hackers actively exploit these vulnerabil- ities as indicated in reports from the University of Wash- Modern web browsers are complex. They provide a ington [46], Microsoft [61], and Google [49, 48]. high-performance and rich computational environment Both industry and academia have improved the se- for web-based applications, but they are prone to nu- curity and reliability of web browsers. Current com- merous types of security vulnerabilities that attackers modity browsers make large strides towards improving actively exploit. However, because major browser plat- the security and reliability of plugins by using sandbox- forms differ in their implementations they rarely exhibit ing techniques to isolate plugins from the rest of the the same vulnerabilities. browser [62, 33]. However, these browsers still scatter In this paper we present Cocktail, a system that uses security logic throughout millions of lines of code, leav- three different off-the-shelf web browsers in parallel to ing these systems susceptible to browser-based attacks. provide replicated execution for withstanding browser- Current research efforts, like Tahoma [32], the OP web based attacks and improving browser reliability. Cock- browser [36], the Gazelle web browser [59], and the Illi- tail mirrors inputs to each replica and votes on browser nois Browser Operating System [58] all propose build- states and outputs to detect potential attacks, while con- ing new web browsers to improve security. Although tinuing to run. The net effect of Cocktail’s architecture these browsers represent a vast improvement in security is to shift the security burden of the system from complex over monolithic commodity browsers, they require re- browsers to a simplified layer of software. We demon- implementing large portions of the browser to withstand strate that Cocktail can withstand real-world browser attacks. Additionally, all of these browsers exhibit fail- exploits and reliability issues, such as browser crashes, stop behavior when encountering a bug or attempted ex- while adding only 31.5% overhead to page load latency ploit, making them susceptible to browser crashes. times on average, and remaining compatible with popu- This paper presents Cocktail, a system that uses repli- lar web sites. cated execution of multiple existing web browsers to help withstand browser bugs and security vulnerabili- ties. Cocktail runs three different off-the-shelf browsers, 1 Introduction including different plugins, in parallel with the assump- tion that any two of them are unlikely to be vulnerable at The near ubiquity of Internet access has put a wealth the same time or exploited by the same malicious page. of information and ever-increasing opportunities for Cocktail replicates user interaction and network requests social interaction at the fingertips of users. Driving in each of the three browsers, then votes on network this revolution is the modern web browser, which has outputs and browser states to detect any modifications evolved from a relatively simple client application de- resulting from browser bugs or web-based attacks. By signed to display static HTML data into a complex net- mirroring inputs to three different browsers and voting worked operating system tasked with managing the myr- on outputs, Cocktail shifts most of the browser’s secu- iad of web-based applications people use daily. Support rity enforcement into a thin and simple software layer, for dynamic content, multimedia data, and extensibil- while reusing the mature, fast, and feature-rich imple- ity has greatly enriched user’s experiences at the cost of mentation of existing web browsers. increasing the complexity of the browser itself. As a Replicated execution [24, 25, 31] is conceptually result, current web browsers are plagued with security simple, but it is extremely expensive to implement in vulnerabilities, as evidenced by Firefox, Safari, Google practice for security purposes. To prevent replicas from Chrome, Opera, and Internet Explorer reporting 374 new falling victim to the same attack, each replica must be a security vulnerabilities in 2009 and 500 in 2010 [18]. distinct implementation of the same specification, which requires significant development resources. For exam- ple, N-version programming [30] usually requires three !"!#$%&'()* times as many software developers. In contrast Cocktail +"!#$*01##.././* takes advantage of a form opportunistic N-version pro- gramming by using three off-the-shelf browsers directly. !"!#$%&'()* In Cocktail’s case the specification is provided by web !"!#$%&'()* standards bodies [20, 13, 2, 19, 12, 3], and the imple- +"!#$*01##.././* mentations are represented by three major web browsing !"!#$%&'()* +"!#$*,!-)./* systems: Firefox, Opera, and Google Chrome. !"!#$%&'()* Although modern web browsers respect common standards like HTML, HTTP, CSS, JavaScript, and the !"!#$%&'()* Domain Object Model (DOM), most browsers imple- !"!#$%&'()* +"!#$*,!-)./* ment slight modifications to these standard web pro- tocols. These differences require Cocktail to abstract Figure 1. Results of the same exploit being states and to cope with non-determinism between the served!"!#$%&'() to* four different browsers. browsers in order to extract reliable features to vote on for security. Designing these techniques is challeng- ing because developers did not build browsers with N- Version programming in mind. During our experiments, we ran this exploit on Fire- Our experiments show that Cocktail is practical, pre- fox 3.5 and confirmed the existence of the successful vents real attacks, and withstands both reliability issues attack. However, when we opened this same malicious and injected faults. Cocktail’s replicas run in parallel, so page using Internet Explorer, Safari, Chrome, or Opera, there is almost no performance loss. While more sys- these browsers safely avoid the attack, as illustrated in tem resources are required, multi-core systems continue Figure 1, because none of these browsers had this same to gain popularity, making this style of security practical bug. Surprisingly, even older versions of Firefox on on modern computer systems. Windows XP were unaffected by this attack. This differ- Our contributions are: ence in processing the malicious payload motivates our architecture that uses three different browsers to with- Cocktail is the first system to show how to use mul- • stand attacks. tiple browsers as a form of opportunistic N-Version programming for improved security through repli- cated execution. 3 Problem statement, threat model, and We show how to abstract browser states and cope assumptions • with non-determinism to enable the use of existing browsers in Cocktail, despite differences in their Cocktail focuses on providing protection for implementations. browsers and plugins by running different browser implementations in parallel and detecting any inconsis- We demonstrate that Cocktail can withstand a wide • tencies between these browsers. We use three distinct range of real world attacks with little overhead to off-the-shelf browsers and Flash player plugins. the overall browsing experience. We focus on attacks on browsers themselves where an attacker can compromise a browser vulnerability and 2 A motivating example control the browser. In our threat model, we assume that an attacker has On July 13 2009, researchers published a public taken over a web site and can serve arbitrary data to proof-of-concept exploit for Firefox 3.5 [7]. This exploit Cocktail. This data can come via a web site that the attacks a heap overflow vulnerability found in the new user visits directly, or it can come indirectly through a JavaScript just-in-time compiler that Mozilla developers web site that serves off-site network resources, like ads. introduced in Firefox 3.5. With just a single visit to a We assume that this malicious data can result in a com- malicious web page, the attacker can run arbitrary in- promise to any of the browser replicas executing within structions on the victim’s Windows XP computer. With Cocktail, which implies that the attacker has the ability a few minor modifications, this exploit can also com- to execute arbitrary instructions with the full privileges promise the Firefox browser on Linux and Mac OS X to of the replica. execute arbitrary instructions on these platforms as well Currently, Cocktail does not provide any protection [9, 8]. against bugs in web-based applications. Fundamentally, bugs like cross-site scripting [35] and cross-site request To see this more clearly take, for instance, the state forgery [65] result from bugs in the server-side code. abstraction of network requests. If at least two of the The resulting attacks operate within current browser se- three replicas attempt to fetch an image at location curity policies, putting them beyond the scope of Cock- foo.com/image.jpg, then Cocktail will fetch the tail. resource and return the data back to the requesting repli- We trust the layers upon which Cocktail is built. This cas. However, if none of the replicas request the same includes the network component and the visual voter in image then Cocktail will deny the request because it UI component, the libraries that the output component does not reach consensus. By using network requests uses, the Systrace tool we use to build browser
Recommended publications
  • On the Incoherencies in Web Browser Access Control Policies
    On the Incoherencies in Web Browser Access Control Policies Kapil Singh∗, Alexander Moshchuk†, Helen J. Wang† and Wenke Lee∗ ∗Georgia Institute of Technology, Atlanta, GA Email: {ksingh, wenke}@cc.gatech.edu †Microsoft Research, Redmond, WA Email: {alexmos, helenw}@microsoft.com Abstract—Web browsers’ access control policies have evolved Inconsistent principal labeling. Today’s browsers do piecemeal in an ad-hoc fashion with the introduction of new not have the same principal definition for all browser re- browser features. This has resulted in numerous incoherencies. sources (which include the Document Object Model (DOM), In this paper, we analyze three major access control flaws in today’s browsers: (1) principal labeling is different for different network, cookies, other persistent state, and display). For resources, raising problems when resources interplay, (2) run- example, for the DOM (memory) resource, a principal is time changes to principal identities are handled inconsistently, labeled by the origin defined in the same origin policy and (3) browsers mismanage resources belonging to the user (SOP) in the form of <protocol, domain, port> [4]; but principal. We show that such mishandling of principals leads for the cookie resource, a principal is labeled by <domain, to many access control incoherencies, presenting hurdles for > web developers to construct secure web applications. path . Different principal definitions for two resources are A unique contribution of this paper is to identify the com- benign as long as the two resources do not interplay with patibility cost of removing these unsafe browser features. To do each other. However, when they do, incoherencies arise. For this, we have built WebAnalyzer, a crawler-based framework example, when cookies became accessible through DOM’s for measuring real-world usage of browser features, and used “document” object, DOM’s access control policy, namely the it to study the top 100,000 popular web sites ranked by Alexa.
    [Show full text]
  • 12 Browser Alternativi Dalle Alte Prestazioni
    12 browser alternativi dalle alte prestazioni Scritto da Mercoledì 17 Marzo 2010 23:59 E' molto probabile che per leggere queste righe stiate utilizzando un browser come Firefox, oppure Internet Explorer, o Google Chrome. Questa considerazione nasce dalla constatazione che questi tre browser assieme coprono circa il 90% del mercato. Il fatto che questi 3 programmi abbiano una così vasta popolarità non comporta che si tratti delle soluzioni migliori, vista l'abbondanza di alternative presenti. {loadposition user7} Ecco, a titolo di esempio, una serie di ben 12 browser disponibili gratuitamente, che potrebbero in realtà corrispondere alle vostre esigenze in maniera migliore rispetto ai nomi più conosciuti. Maxthon Si tratta del progetto nato come MyIE2. Nel corso degli anni è diventato un potente browser a schede adatto per tutti gli utenti. Oltre alle funzionalità di navigazione di base, Maxthon Browser fornisce un ricco set di funzionalità per migliorarei vostri percorsi di navigazione 1 / 10 12 browser alternativi dalle alte prestazioni Scritto da Mercoledì 17 Marzo 2010 23:59 Sistema Operativo: Windows Arora Arora è un leggero browser web. È dotato di rendering veloce, potente motore JavaScript e supporta plug-in Netscape. Sistema Operativo: Windows, Mac OS X, Linux Amaya 2 / 10 12 browser alternativi dalle alte prestazioni Scritto da Mercoledì 17 Marzo 2010 23:59 SistemaAmayaperfettamente non Operativo: è solo integrata un Windows, browser con l'editing, Macweb, OS ma tanto X,è ancheUnix da renderloplatforms un editor un web. prezioso La modalità strumento di visualizzazionecollaborativo. è Flock 3 / 10 12 browser alternativi dalle alte prestazioni Scritto da Mercoledì 17 Marzo 2010 23:59 Flock è un browser con un focus sui social media.
    [Show full text]
  • Flash Mx Actionscript Gratis Epub, Ebook
    FLASH MX ACTIONSCRIPT GRATIS Auteur: Bob van Duuren Aantal pagina's: 242 pagina's Verschijningsdatum: 2002-07-20 Uitgever: Duuren Media, Van EAN: 9789059400108 Taal: nl Link: Download hier Macromedia Flash MX & ActionScripting * Hoe worden beoordelingen berekend? Voor het berekenen van de totale sterrenbeoordeling en de procentuele verdeling per ster gebruiken we geen gewoon gemiddelde. In plaats daarvan houdt ons systeem rekening met zaken als hoe recent een recensie is en of de recensent het item op Amazon heeft gekocht. Verder worden recensies ook geanalyseerd om de betrouwbaarheid te verifiëren. Toprecensies Recentste Toprecensies. Beste recensies uit Nederland. Er zijn 0 recensies en 0 beoordelingen van Nederland. Beste recensies uit andere landen. Vertaal alle beoordelingen naar het Nederlands. Geverifieerde aankoop. This is different. Philip achieves this in his own weighty tome nearly pages! Ze kunnen namelijk niet zonder problemen worden vergroot of verkleind. De afbeelding is voor één schermresolutie opgeslagen. Vergroten kan wel, maar dit gaat ten koste van de scherpte van de afbeelding. Vectorafbeeldingen daarentegen kunnen zonder problemen worden aangepast, omdat de coördinaten wiskundig worden herberekend met als gevolg dat vectorafbeeldingen op alle verschillende media hetzelfde worden getoond. Dit garandeert een uniforme presentatie van de gegevens. Samen met de beperkte omvang van het bestand zorgt dit voor een aantal unieke eigenschappen van Flash. Adobe Flash beschikt over een eigen programmeertaal , ActionScript, waarmee men volwaardige websites en applicaties kan ontwikkelen. In nieuwere versies van Flash, vanaf Flash MX, is het door de toevoeging van het LoadVars-object mogelijk gemaakt gemakkelijker te communiceren met MySQL en PHP , waardoor er een wereld opengegaan is voor het gebruiken van dynamische gegevens.
    [Show full text]
  • Browser Wars
    Uppsala universitet Inst. för informationsvetenskap Browser Wars Kampen om webbläsarmarknaden Andreas Högström, Emil Pettersson Kurs: Examensarbete Nivå: C Termin: VT-10 Datum: 2010-06-07 Handledare: Anneli Edman "Anyone who slaps a 'this page is best viewed with Browser X' label on a Web page appears to be yearning for the bad old days, before the Web, when you had very little chance of read- ing a document written on another computer, another word processor, or another network" - Sir Timothy John Berners-Lee, grundare av World Wide Web Consortium, Technology Review juli 1996 Innehållsförteckning Abstract ...................................................................................................................................... 1 Sammanfattning ......................................................................................................................... 2 1 Inledning .................................................................................................................................. 3 1.1 Bakgrund .............................................................................................................................. 3 1.2 Syfte ..................................................................................................................................... 3 1.3 Frågeställningar .................................................................................................................... 3 1.4 Avgränsningar .....................................................................................................................
    [Show full text]
  • Maelstrom Web Browser Free Download
    maelstrom web browser free download 11 Interesting Web Browsers (That Aren’t Chrome) Whether it’s to peruse GitHub, send the odd tweetstorm or catch-up on the latest Netflix hit — Chrome’s the one . But when was the last time you actually considered any alternative? It’s close to three decades since the first browser arrived; chances are it’s been several years since you even looked beyond Chrome. There’s never been more choice and variety in what you use to build sites and surf the web (the 90s are back, right?) . So, here’s a run-down of 11 browsers that may be worth a look, for a variety of reasons . Brave: Stopping the trackers. Brave is an open-source browser, co-founded by Brendan Eich of Mozilla and JavaScript fame. It’s hoping it can ‘save the web’ . Available for a variety of desktop and mobile operating systems, Brave touts itself as a ‘faster and safer’ web browser. It achieves this, somewhat controversially, by automatically blocking ads and trackers. “Brave is the only approach to the Web that puts users first in ownership and control of their browsing data by blocking trackers by default, with no exceptions.” — Brendan Eich. Brave’s goal is to provide an alternative to the current system publishers employ of providing free content to users supported by advertising revenue. Developers are encouraged to contribute to the project on GitHub, and publishers are invited to become a partner in order to work towards an alternative way to earn from their content. Ghost: Multi-session browsing.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Lime Rock Gazette
    L 1M E R 0 C K GAZETTE. DEVOTED TO COMMERCE, AGRICULTURE, ART, SCIENCE, MORALITY AND GENERAL INTELLIGENCE. PUBLISHED WEEKLY, BY RICHARDSON & PORTER. Tpiihs, $1,50 in Advance, $1.75 in six monllis $2.00 afleiv-Adverliseinenls inserted al Hie ciisloniarv prices VOL J- LAST—TIIOIIASTOV, TlllltSO AV 1IOILVIA«L O< TOK I it 15. 1840 AO. »». i.j_ - xi u f c i . b.w rjw vjwcyxayztt i TIlC Relllllied Pastor. *,o,n v*cw> nn,l 0,1 *Gc morning of the 'themselves together for family worship.— from nine o’clock in the morning to three 'Aint I a man now. Miss Tabitha, I ’d only, however, who knew the former level- twenty-second of the same month he look- Ho was told that twenty missionaries might I in the nOcrnoon; and from live to nine in like to know ,’ said Jotliam , rising with ness o f the spot. Ct will be recollected By many ol otn renders, that (,d ,|p0„ ,bc s|,((1.es of England—on the find employment there. the eveninu. There were twelve hundred spirit and putting his hat on his head, ‘ I f The Lieutenant, who had c ritic a lly the Kcv. Mr. Vomroy, Tastor ot the livst ( j following day ho landed. He wished to; Mr. l’omroy enumerated the places of | persons composing the convention, about I aint a man now. and a whole hog o f a watched the manoeuvring of the men, grognltonnl Church ol Bangor, lelt his people see ns much of the land of our fathers as interest ho visited in the Holy Land.— nine hundred of whom were clergymen, one too, I think it darned strange.’ congratulated the Orderly on the perfec- sonic sixteen months Since, for an European possible— a land that should lie dear to ! Sidon, Sarepta, Tyre.
    [Show full text]
  • Using Property-Based Testing, Weighted Grammar-Based Generators and a Consensus Oracle to Test Browser Rendering Engines and To
    USING PROPERTY-BASED TESTING, WEIGHTED GRAMMAR-BASED GENERATORS AND A CONSENSUS ORACLE TO TEST BROWSER RENDERING ENGINES AND TO REPRODUCE MINIMIZED VERSIONS OF EXISTING TEST CASES by JOEL DAVID MARTIN Presented to the Faculty of the Graduate School of The University of Texas at Arlington in Partial Fulfillment of the Requirements for the Degree of DOCTOR OF PHILOSOPHY THE UNIVERSITY OF TEXAS AT ARLINGTON December 2019 Supervising Committee: Farhad Kamangar, Supervising Professor David Levine, Supervising Professor Manfred Huber Gergley Zaruba Copyright by Joel David Martin 2019 The copyright of Chapter2 was transferred to the IEEE as part of publication in COMPSAC 2018 (\Property-Based Testing of Browser Rendering Engines with a Consensus Oracle") [1]. Please refer to the IEEE for information about licensing the content from Chapter2. Chapter3 is a manuscript that is intended for separated publication. All copyrights on Chapter3 are currently reserved to Joel Martin. The remainder of this work, excluding Chapter2 and Chapter3, is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. ACKNOWLEDGMENTS Thank you to the members of my Supervising Committee for their support and guidance. In particular, I would like to thank David Levine who spent many long hours with me discussing the research and helping with the numerous large and small details that were necessary to complete my thesis. Many thanks to my employer, Viasat, for the financial investment toward my education. Thank you to my supervisors at Viasat, Ingolf Krueger and Markus Kaltenbach, for their support and encouragement throughout my graduate education. I would like to apologize for the harm done to numerous figurative trees during the completion of this research.
    [Show full text]
  • Internet Explorer 9 Features
    m National Institute of Information Technologies NIIT White Paper On “What is New in Internet Explorer 9” Submitted by: Md. Yusuf Hasan Student ID: S093022200027 Year: 1st Quarter: 2nd Program: M.M.S Date - 08 June 2010 Dhaka - Bangladesh Internet Explorer History Abstract: In the early 90s—the dawn of history as far as the World Wide Web is concerned—relatively few users were communicating across this Internet Explorer 9 (abbreviated as IE9) is the upcoming global network. They used an assortment of shareware and other version of the Internet Explorer web browser from software for Microsoft Windows operating system. In 1995, Microsoft Microsoft. It is currently in development, but developer hosted an Internet Strategy Day and announced its commitment to adding Internet capabilities to all its products. In fulfillment of that previews have been released. announcement, Microsoft Internet Explorer arrived as both a graphical Web browser and the name for a set of technologies. IE9 will have complete or nearly complete support for all 1995: Internet Explorer 1.0: In July 1995, Microsoft released the CSS 3 selectors, border-radius CSS 3 property, faster Windows 95 operating system, which included built-in support for JavaScript and embedded ICC v2 or v4 color profiles dial-up networking and TCP/IP (Transmission Control support via Windows Color System. IE9 will feature Protocol/Internet Protocol), key technologies for connecting to the hardware accelerated graphics rendering using Direct2D, Internet. In response to the growing public interest in the Internet, Microsoft created an add-on to the operating system called Internet hardware accelerated text rendering using Direct Write, Explorer 1.0.
    [Show full text]
  • The Multi-Principal OS Construction of the Gazelle Web Browser
    The Multi-Principal OS Construction of the Gazelle Web Browser Helen J. Wang, Chris Grier, Alex Moshchuk, Sam King, Piali Choudhury, Herman Venter Browser as an application platform • Single stop for many computing needs – banking, shopping, office tasks, social networks, entertainment • Static document browsing rich programs – obtained from mutually distrusting origins – same-origin policy: a browser is a multi-principal platform where web sites are principals • Browser = prime target of today’s attackers Your valuables are online! • Existing browser security mentality: – valuables on local machine – protect local machine from the web Browser OS • This work’s mentality: – valuables online – must also protect web site principals from one another Browser OS Browser design requires OS thinking • Cross-principal protection is an essential function of an operating system • Fundamental flaw with existing browser designs: – OS logic is intermingled with application-specific content processing – consequences: HTML • unreliable cross-principal protection JS engine parsing • many vulnerabilities DOM same-origin rendering protection Persistent network state access browser Gazelle • An OS exclusively manages: HTML JS engine – protection across principals parsing DOM – resource allocation same-origin – resource access control rendering protection Persistent network state access • Our approach for designing Gazelle: Browser kernel – take all OS functionality out of content processing logic – put it into a small, simple browser kernel Gazelle • Build
    [Show full text]
  • Tracking Users Across the Web Via TLS Session Resumption
    Tracking Users across the Web via TLS Session Resumption Erik Sy Christian Burkert University of Hamburg University of Hamburg Hannes Federrath Mathias Fischer University of Hamburg University of Hamburg ABSTRACT modes, and browser extensions to restrict tracking practices such as User tracking on the Internet can come in various forms, e.g., via HTTP cookies. Browser fingerprinting got more difficult, as trackers cookies or by fingerprinting web browsers. A technique that got can hardly distinguish the fingerprints of mobile browsers. They are less attention so far is user tracking based on TLS and specifically often not as unique as their counterparts on desktop systems [4, 12]. based on the TLS session resumption mechanism. To the best of Tracking based on IP addresses is restricted because of NAT that our knowledge, we are the first that investigate the applicability of causes users to share public IP addresses and it cannot track devices TLS session resumption for user tracking. For that, we evaluated across different networks. As a result, trackers have an increased the configuration of 48 popular browsers and one million of the interest in additional methods for regaining the visibility on the most popular websites. Moreover, we present a so-called prolon- browsing habits of users. The result is a race of arms between gation attack, which allows extending the tracking period beyond trackers as well as privacy-aware users and browser vendors. the lifetime of the session resumption mechanism. To show that One novel tracking technique could be based on TLS session re- under the observed browser configurations tracking via TLS session sumption, which allows abbreviating TLS handshakes by leveraging resumptions is feasible, we also looked into DNS data to understand key material exchanged in an earlier TLS session.
    [Show full text]
  • University of Camerino Computer Science (LM 18) Browser Evolution
    University of Camerino Computer Science (LM 18) Browser Evolution Project of Web 2.0 Autor: Luciani Alex Prof: Vaccari Carlo License This material is distributed under the Creative Commons "Attribution - NonCommercial - Share Alike - 3.0", available at http://creativecommons.org/licenses/by-nc-sa/3.0/ . What is a Browser? A browser is a software application, it retrieves and shows elements of the web. Story Prehistory 1963: Ted Nelson: Hypertext. 1987: John Bottoms: Silversmith, SGML. 1989: Tim Berners-Lee: WWW, HTML, HTTP, W3C. 1994: Mosaic → Netscape. Story Mosaic screenshot Story First Browser War (1996 - 2004) Story Second Browser War (2004 - ...) Story January 2010, Firefox passed IE Story The Actual Situation (2011) Data from statcounter.com Browser Market Share % Browser Version Market Share % Apr 11 Apr 11 IE 44.52 IE 8.0 30.24 Firefox 29.67 Firefox 3.6 18.91 Chrome 18.29 Chrome 10.0 16.03 Safari 5.04 IE 7.0 7.82 Opera 1.91 Firefox 4.0 7.59 IE 6.0 4.14 Safari 5.0 3.83 IE 9.0 2.32 Firefox 3.5 1.99 Tech Evolution Web Browser Engines They paint the web pages interpreting the client-side scripts. Layout Engine License Main Browser Gecko Free and OpenSource Firefox Presto Proprietary Opera Trident Proprietary Internet Explorer WebKit Free (GNU LGPL) Safari, Chrome Tech Evolution Protocols Connection: HTTP. Security: SSL, HTTPS Languages and Client Side HTML, HTML5 Javascript, Ajax CSS XML, SVG WebGL Tech Evolution Ajax Example Tech Evolution Google Body Browser uses WebGL Tech Evolution GUI Evolution Google 10 Firefox 3.6 Firefox 4 Tech Evolution GUI Evolution Explorer 8 Explorer 9 Tech Evolution Browser Testing Acid Test: testing client side script languages.
    [Show full text]