6 CONCLUSION AND FUTURE
WORK
In this paper, we present a simple model of web plat-
form which comprises of some basic components of
web security like origin, HTML elements and HTTP
transaction, browser and servers. Our threat model
includes modelling of malicious cross-origin requests
and showing that it can be mitigated using CORP.
This model can be extended to include other web se-
curity vulnerabilities and verifying their mitigation
measures.
As future work, we plan to model specific cross-
origin attacks, such as CSRF, clickjacking, cross-site
timing attacks, login detection, and verify that CORP
can be used to mitigate them. We also plan to test
CORP with complex cross-origin request scenarios,
such as Federated Identity Management.
REFERENCES
Clickjacking. https://www.owasp.org/index.php/
Clickjacking.
Cross-site scripting (XSS). https://en.m.wikipedia.org/wiki/
Cross-site scripting.
Web Application Timing attack. https://codeseekah.com/
2012/04/29/timing-attacks-in-web-applications/.
(2012). I Know What Websites You Are
Logged-In To (Login-Detection via
CSRF). https://www.whitehatsec.com/blog/
i-know-what-websites-you-are-logged-in-\
to-login-detection-via-csrf/.
(2016). Cross-site request forgery. https://www.owasp.org/
index.php/Cross-Site Request Forgery (CSRF).
Akhawe, D., Barth, A., Lam, P. E., Mitchell, J., and Song,
D. (2010). Towards a formal foundation of web secu-
rity. In 2010 23rd IEEE Computer Security Founda-
tions Symposium, pages 290–304. IEEE.
Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Com-
pagna, L., Cu
´
ellar, J., Drielsma, P. H., H
´
eam, P.-C.,
Kouchnarenko, O., Mantovani, J., et al. (2005). The
avispa tool for the automated validation of internet
security protocols and applications. In International
Conference on Computer Aided Verification, pages
281–285. Springer.
Bhargavan, K., Fournet, C., and Gordon, A. D. (2006). Ver-
ified reference implementations of ws-security proto-
cols. In International Workshop on Web Services and
Formal Methods, pages 88–106. Springer.
Blanchet, B., Abadi, M., and Fournet, C. (2005). Auto-
mated verification of selected equivalences for secu-
rity protocols. In 20th Annual IEEE Symposium on
Logic in Computer Science (LICS’05), pages 331–
340. IEEE.
Cao, Y., Rastogi, V., Li, Z., Chen, Y., and Moshchuk, A.
(2013). Redefining web browser principals with a con-
figurable origin policy. In 2013 43rd Annual IEEE/I-
FIP International Conference on Dependable Systems
and Networks (DSN), pages 1–12. IEEE.
Carlucci Aiello, L. and Massacci, F. (2001). Verifying se-
curity protocols as planning in logic programming.
ACM Transactions on Computational Logic (TOCL),
2(4):542–580.
Chen, E. Y., Bau, J., Reis, C., Barth, A., and Jackson, C.
(2011). App isolation: get the security of multiple
browsers with just one. In Proceedings of the 18th
ACM conference on Computer and communications
security, pages 227–238. ACM.
Clarke, E. M., Jha, S., and Marrero, W. (2000). Verify-
ing security protocols with brutus. ACM Transactions
on Software Engineering and Methodology (TOSEM),
9(4):443–487.
Cremers, C. J. (2008). The scyther tool: Verification, falsi-
fication, and analysis of security protocols. In Inter-
national Conference on Computer Aided Verification,
pages 414–418. Springer.
De Ryck, P., Desmet, L., Joosen, W., and Piessens, F.
(2011). Automatic and precise client-side protec-
tion against csrf attacks. In European Symposium
on Research in Computer Security, pages 100–116.
Springer.
Gordon, A. D. and Pucella, R. (2005). Validating a web
service security abstraction by typing. Formal Aspects
of Computing, 17(3):277–318.
Jackson, D. (2012). Software Abstractions: logic, language,
and analysis. MIT press.
Telikicherla, K. C. and Choppella, V. (2013). Alloy model
for cross origin request policy (corp). Technical re-
port.
Telikicherla, K. C., Choppella, V., and Bezawada, B.
(2014). Corp: A browser policy to mitigate web in-
filtration attacks. In International Conference on In-
formation Systems Security, pages 277–297. Springer.
Zalewski, Michal (2011). Browser Security Hand-
book. Technical report. https://code.google.com/p/
browsersec/wiki/Part2#Same-origin policy.
A Formal Model of Web Security Showing Malicious Cross Origin Requests and Its Mitigation using CORP
523