polito.it
Politecnico di Torino (logo)

Vulnerability Analysis of Web Push Implementations in the Wild

Alberto Carboneri

Vulnerability Analysis of Web Push Implementations in the Wild.

Rel. Cataldo Basile. Politecnico di Torino, Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering), 2023

[img] PDF (Tesi_di_laurea) - Tesi
Accesso riservato a: Solo utenti staff fino al 28 Luglio 2024 (data di embargo).
Licenza: Creative Commons Attribution Non-commercial No Derivatives.

Download (752kB)
Abstract:

Web push is a novel technology, supported by all major browsers, which has gained significant traction in the developer community thanks to its ability to engage users efficiently and anonymously. However, security researchers have yet to properly investigate the possible threats arising from its improper use. In this thesis, we explore the capabilities and features of web push, report common usage patterns found in the wild, including an analysis of the inner working of most third-party providers, and present a security analysis of such implementations. We demonstrate a novel history-sniffing attack abusing a common implementation mistake, and a dangerous use case of the well-known CSRF vulnerability. We conduct and show the results of the first large-scale measurement aimed at identifying the prevalence of this technology and the related vulnerabilities on the web. The result of this measurement is also used to quantify the presence of a common negative pattern where websites aggressively ask the user for permission to use web push. Furthermore, we analyze the complexity of efficiently and correctly implementing personalized web push notifications and we report design issues we found on Twitter. We propose a theoretical system that corrects those mistakes and better handles all scenarios. Finally, we present some straightforward countermeasures and good practices to effectively fix the reported vulnerabilities and make the technology safer. Overall this work is intended to remark on the dangers of developing and implementing new technology without considering the security implications and to shine a light on some of the vulnerabilities present in implementations in the wild, possibly leading to a greater interest of the security community and further research on this and related subjects.

Relatori: Cataldo Basile
Anno accademico: 2022/23
Tipo di pubblicazione: Elettronica
Numero di pagine: 49
Soggetti:
Corso di laurea: Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering)
Classe di laurea: Nuovo ordinamento > Laurea magistrale > LM-32 - INGEGNERIA INFORMATICA
Ente in cotutela: UNIVERSITY OF ILLINOIS AT CHICAGO (STATI UNITI D'AMERICA)
Aziende collaboratrici: Politecnico di Torino
URI: http://webthesis.biblio.polito.it/id/eprint/27645
Modifica (riservato agli operatori) Modifica (riservato agli operatori)