Clickjacking Research Paper
Clickjacking Research Paper
Abhishek Hajare
Department of Information Technology
Rutgers University, Newark and New Brunswick
[email protected]
Abstract
site.
1. Introduction
When multiple applications or web sites (or OS
framebusting
is
fundamentally
Section
3.2)
suffer
from
poor
usability,
temporal context.
her webcam.
defense:
Widget
compatibility:
protection
should
support
clickjacking
third-party
widgets.
button
click.
2.1.1 Compromising
target
display
integrity
Modern browsers support HTML/CSS styling
features that allow attackers to visually hide the
target element but still route mouse events to it.
For example, an attacker can make the target
element transparent by wrapping it in a div
container with a CSS opacity value of zero; to
entice a victim to click on it, the attacker can draw a
decoy under the target element by using a lower
CSS z-index. Alternatively, the attacker may
completely cover the target element with an opaque
decoy, but make the decoy unclickable by setting
the CSS property pointer-events:none. A victims
click would then fall through the decoy and land on
click.
2.2 Consequences
element.
followers.
transparency
from
all
cross-origin
elements,
action .
3.3 Framebusting
clickjacking
button.
victim
by
two
frames,
then
accessing
web sites:
if (top . location != location )
if (top . location !=
s e l f . location ) {
Attacker
victim .com>
Fake cursor
Real cursor
sub-frame:<iframe
src=http://www.
known
clickjacking
techniques.
These
dialog
page)
successfully
employs
5 InContext Defense
input to them.
context.
web-site) protection.
from the real cursor and cause the user to act out of
see
techniques,
system-provided
(rather
individually
and
than
in
attacker-
various
OS screenshot:
or the element.
element.
Muting. Sound could also draw a users attention
away from her actions. For example, a voice may
instruct the user to perform certain tasks, and loud
noise could trigger a user to quickly look for a way
to stop the noise. To stop sound distractions, we
mute the speakers when a user interacts with
sensitive elements.
Lightbox around sensitive element. Greyout (also
called Lightbox) effects are commonly used for
focusing the users attention on a particular part of
the screen (such as a popup dialog). In our system,
we apply this effect by overlaying a dark mask on
all rendered content around the sensitive UI element
whenever the cursor is within that elements area.
This causes the sensitive element to stand out
visually.
The mask cannot be a static one. Otherwise, an
attacker could use the same static mask in its
application to dilute the attention-drawing effect of
the mask. Instead, we use a randomly generated
mask which consists of a random gray value at each
pixel. No programmatic cross-origin keyboard focus
5.1.3
integrity, as
described
earlier. For
Like
Twitter
200x20 px
13.54 ms
8.60 MB
Follow
Animated
468x60 px
14.92 ms
7.90 MB
fps)
Google
450x275 px
24.78 ms
12.95 MB
OAuth
PayPal
385x550 px
30.88 ms
15.74 MB
GIF
(1.5
Checkout
Table 1: Performance of InContext. For each sensitive
element, this table shows extra latency imposed on each
click, as well as extra memory used.
Dimensions
Click
Element
Delay
Overhead
12.04 ms
90x20 px
Memory
Conclusion
5.11 MB
Attacks.
https://iseclab.org/papers/asiaccs122-
balduzzi.pdf
http://www.sectheory.com/clickjacking.htm
http://uiredressing.mniemietz.de/uiRedressin
clickjacking attacks.
g.pdf
Busting:
Vulnerabilities
Study
on
of
Clickjacking
Popular
Sites.
http://w2spconf.com/2010/papers/p27.pdf
6. G. Rydstedt et al, 2010. Framing attacks on
smart phones and dumb routers: Tap-jacking
and geolocalization.
7. Paul
Stone,
2010.
Next
Generation
Clickjacking.
http://www.contextis.com/documents/5/Cont
from Clickjacking
ext-Clickjacking_white_paper.pdf
8. http://research.zscaler.com/2008/10/clickjac
References:
1. Devdatta Akhawe,2011. A perpetual View of
UI
Security.
http://www.cs.berkeley.edu/~dawnsong/pape
rs/woot14-akhawe.pdf
king-defenses.html
9. http://www.cert.org/informationfor/securing-web-browser-index.cfm
10. http://www.troyhunt.com/2013/05/clickjackattack-hidden-threat-right-in.html