Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications - ICT Systems Security and Privacy Protection (SEC 2014) Access content directly
Conference Papers Year : 2014

Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications


Modern web applications frequently implement complex control flows, which require the users to perform actions in a given order. Users interact with a web application by sending HTTP requests with parameters and in response receive web pages with hyperlinks that indicate the expected next actions. If a web application takes for granted that the user sends only those expected requests and parameters, malicious users can exploit this assumption by crafting harming requests. We analyze recent attacks on web applications with respect to user-defined requests and identify their root cause in the missing enforcement of allowed next user requests. Based on this result, we provide our approach, named Ghostrail, a control-flow monitor that is applicable to legacy as well as newly developed web applications. It observes incoming requests and lets only those pass that were provided as next steps in the last web page. Ghostrail protects the web application against race condition exploits, the manipulation of HTTP parameters, unsolicited request sequences, and forceful browsing. We evaluate the approach and show that it neither needs a training phase nor a manual policy definition while it is suitable for a broad range of web technologies.
Fichier principal
Vignette du fichier
978-3-642-55415-5_22_Chapter.pdf (4 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01370372 , version 1 (22-09-2016)





Bastian Braun, Caspar Gries, Benedikt Petschkuhn, Joachim Posegga. Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications. 29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.264-277, ⟨10.1007/978-3-642-55415-5_22⟩. ⟨hal-01370372⟩
107 View
113 Download



Gmail Facebook X LinkedIn More