skip to main content
10.1145/1755913.1755942acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

Residue objects: a challenge to web browser security

Published:13 April 2010Publication History

ABSTRACT

A complex software system typically has a large number of objects in the memory, holding references to each other to implement an object model. Deciding when the objects should be alive/active is non-trivial, but the decisions can be security-critical. This is especially true for web browsers: if certain browser objects do not disappear when the new page is switched in, basic security properties can be compromised, such as visual integrity, document integrity and memory safety. We refer to these browser objects as residue objects. Serious security vulnerabilities due to residue objects have been sporadically discovered in leading browser products in the past, such as IE, Firefox and Safari. However, this class of vulnerabilities has not been studied in the research literature. Our work is motivated by two questions: (1) what are the challenges imposed by residue objects on the browser's logic correctness; (2) how prevalent can these vulnerabilities be in today's commodity browsers. As an example, we analyze the mechanisms for guarding residue objects in Internet Explorer (IE), and use an enumerative approach to expose and understand new vulnerabilities. Although only the native HTML engine is studied so far, we have already discovered five new vulnerabilities and reported them to IE developers (one of the vulnerabilities has been patched in a Microsoft security update). These vulnerabilities demonstrate a diversity of logic errors in the browser code. Moreover, our study empirically suggests that the actual prevalence of this type of vulnerabilities can be higher than what is perceived today. We also discuss how the browser industry should respond to this class of security problems.

References

  1. Don Box, "Essential COM," ISBN 0-201-63446-5, Addison-Wesley 1998Google ScholarGoogle Scholar
  2. Adam Barth, Joel Weinberger, and Dawn Song. "Cross-Origin JavaScript Capability Leaks: Detection, Exploitation, and Defense," In Proc. of the 18th USENIX Security Symposium, 2009 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Shuo Chen, David Ross, Yi-Min Wang, "An Analysis of Browser Domain-Isolation Bugs and A Light-Weight Transparent Defense Mechanism," in ACM Conference on Computer and Communications Security (CCS), Alexandria, VA, Oct--Nov 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Jim Chow, Ben Pfaff, Tal Garfinkel, Mendel Rosenblum, "Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation." In Proceedings of the 14th USENIX Security Symposium, August 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Jim Chow, Ben Pfaff, Tal Garfinkel, Mendel Rosenblum, "Understanding data lifetime via whole system simulation." In Proc. of the 12th USENIX Security Symposium, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Chris Grier, Shuo Tang, and Samuel T. King, "Secure web browsing with the OP web browser", Proceedings of the 2008 IEEE Symposium on Security and Privacy, May 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Chris Grier, Helen J. Wang, Alexander Moshchuk, Samuel T. King, Piali Choudhury, Herman Venter."The Multi-Principal OS Construction of the Gazelle Web Browser," Proceedings of the 18th USENIX Security Symposium, Montreal, Canada, August 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, and Dan Boneh, "Protecting Browsers from DNS Rebinding Attacks," the Fourteenth ACM Conference on Computer and Communications Security (CCS 2007), November 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Chris Karlof, Umesh Shankar, J.D. Tygar, and David Wagner, "Dynamic Pharming Attacks and Locked Same-origin Policies for Web Browsers," the Fourteenth ACM Conference on Computer and Communications Security (CCS 2007), November 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Mozilla, "XPCOM", http://www.mozilla.org/projects/ xpcom/index.htmlGoogle ScholarGoogle Scholar
  11. Mozilla, "XPConnect (Scriptable Components)", http://www.mozilla.org/scriptable/Google ScholarGoogle Scholar
  12. Object Capability Model. http://c2.com/cgi/wiki? ObjectCapabilityModelGoogle ScholarGoogle Scholar
  13. Paruj Ratanaworabhan, Benjamin Livshits, and Benjamin Zorn. "Nozzle: A Defense Against Heap-spraying Code Injection Attacks," Microsoft Research Technical Report MSR-TR-2008-176, November 2008.Google ScholarGoogle Scholar
  14. Charles Reis, Steven D. Gribble. "Isolating Web Programs in Modern Browser Architectures," Eurosys 2009. Nuremberg, Germany, April 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Jesse Ruderman. "The Same Origin Policy," http://www.mozilla.org/projects/security/components/same-origin.htmlGoogle ScholarGoogle Scholar
  16. Markus Horstmann and Mary Kirtland, "DCOM Architecture," http://msdn.microsoft.com/en-us/library/ms809311.aspxGoogle ScholarGoogle Scholar
  17. SecurityFocus Vulnerability Repository. http://www.securityfocus.com/bidGoogle ScholarGoogle Scholar
  18. Net Applications. "Browser Market Share of March 2009" http://marketshare.hitslink.com/browser-market-share.aspx?qprid=0Google ScholarGoogle Scholar

Index Terms

  1. Residue objects: a challenge to web browser security

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          EuroSys '10: Proceedings of the 5th European conference on Computer systems
          April 2010
          388 pages
          ISBN:9781605585772
          DOI:10.1145/1755913

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 13 April 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate241of1,308submissions,18%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader