博碩士論文 111522066 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:147 、訪客IP:18.118.19.120
姓名 黃詩云(Shih-Yun Huang)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 InfoStealer:基於Chrome瀏覽器擴充程式的網路銀行個人資料竊取方法
(InfoStealer: A Chrome Extension-based Approach to Steal Personal Online Banking Data)
相關論文
★ USB WORM KILLER: Cure USB Flash Worms Through a USB Flash Worm★ Discoverer- Rootkit即時偵測系統
★ 一項Android手機上詐騙簡訊的偵測與防禦機制★ SRA系統防禦ARP欺騙劫持路由器
★ A Solution for Detecting and Defending ARP Spoofing on Virtual Machines★ 針對遠端緩衝區溢位攻擊之自動化即時反擊系統
★ 即時血清系統: 具攻性防壁之自動化蠕蟲治癒系統★ DNSPD: Entrap Botnets Through DNS Cache Poisoning Detection
★ TransSQL: A Translation and Validation-based Solution for SQL-Injection Attacks★ A Spam Mail-based Solution for Botnet Detection and Network Bandwidth Protection
★ Shark: Phishing Information Recycling from Spam Mails★ FFRTD: Beat Fast-Flux by Response Time Differences
★ Antivirus Software Shield against Antivirus Terminators★ MAC-YURI : My ACcount, YoUr ResponsIbility
★ KKBB: Kernel Keylogger Bye-Bye★ CIDP Treatment: An Innovative Mobile Botnet Covert Channel based on Caller IDs with P8 Treatment
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 (2029-9-30以後開放)
摘要(中) 隨著科技的快速發展,瀏覽器擴充程式已經成為提高使用者瀏覽器操作體驗的重要工具。然而,在享受擴充程式提供的強大功能的同時,使用者也需要授予相對應的權限,如此一來也提供惡意攻擊者一個便利的途徑。
本論文針對惡意擴充程式是否能利用用戶授予給擴充程式的權限,竊取網路銀行的個人資訊進行測試,最終確認擴充程式竊取個人資料的可能性,並針對此惡意行為提出防禦對策。
文中首先介紹瀏覽器擴充程式,以及開發過程中使用的工具,還有瀏覽器儲存資料的方式。本文設計並實作出惡意擴充程式InfoStealer系統,主要功能為偵測使用者在網路銀行系統的登入狀態,發送請求至網路銀行伺服器收集使用者資料,最終傳送至其他伺服器,來模擬及分析資料竊取過程。實驗結果部分,展示系統在登入偵測、資料撈取及送出這兩項功能的結果,並分析擴充程式要求的權限範圍與惡意行為的相關性。
本文提供針對此種惡意行為的防禦對策,即除了身分驗證之外,也一併驗證網路請求的標頭來確認請求的來源是否與預期相符。最後,本文討論了資料竊取行為的影響及後果,並指出此研究系統的限制。 
摘要(英) With the rapid advancement of technology, browser extensions have become crucial tools for enhancing user browsing experiences. However, while enjoying the powerful functionalities provided by extensions, users are required to grant corresponding permissions, inadvertently providing a convenient pathway for malicious attackers.
This paper investigates whether malicious browser extensions can exploit permissions granted by users to steal personal information from online banking systems. It aims to confirm the feasibility of extensions stealing personal data and proposes defensive strategies against such malicious behavior.
The paper begins by introducing browser extensions, the development tools used during their creation, and methods for storing data within browsers. It then designs and implements a malicious extension system called InfoStealer, which detects user login status on online banking systems, sends requests to collect user data from banking servers, and ultimately transmits this data to other servers for simulation and analysis of the data theft process. The experimental results demonstrate the system′s capabilities in login detection, data retrieval, and transmission, while analyzing the relevance of extension permissions to malicious behavior.
This study provides defense strategies against such malicious behavior, advocating not only for authentication but also verification of network request headers to ensure requests originate from expected sources. Finally, the paper discusses the impact and consequences of data theft behavior, highlighting limitations of the research system.
關鍵字(中) ★ 瀏覽器擴充程式
★ 網頁安全
★ 資料洩漏
關鍵字(英) ★ Browser Extension
★ Web Security
★ Information leakage
論文目次 中文摘要 i
Abstract ii
目錄 iv
圖目錄 vi
第1章 緒論 1
第2章 背景介紹 4
2.1 Google DevTool 4
2.2 Chrome 擴充程式 7
2.3 Web Storage及Cookies 10
第3章 相關研究 11
第4章 系統架構與實作 13
4.1 攻擊步驟 13
4.2 系統架構 14
4.3 Login Detector 15
4.4 Data Collector 及Data Repository 17
第5章 實驗結果及分析 18
5.1 登入偵測功能 18
5.2 撈取資訊與傳出功能 20
5.3 要求權限分析 23
第6章 防禦對策 25
第7章 討論 27
7.1 資料外洩的影響及後果 27
7.2 更大的威脅 28
7.3 系統限制 28
第8章 結論 29
第9章 參考資料 30
參考文獻 [1] “DevTools,” Chrome for Developers, [線上]. Available: https://developer.chrome.com/docs/devtools.
[2] “API reference,” Chrome for Developers, [線上]. Available: https://developer.chrome.com/docs/extensions/reference/api.
[3] Nav Jagpal, Eric Dingle, Jean-Philippe Gravel, Panayiotis Mavrommatis, Niels Provos, Moheeb Abu Rajab, and Kurt Thomas, Google, “Trends and Lessons from Three Years Fighting Malicious Extensions,” 24th USENIX Security Symposium, pp. 579-593, 2015.
[4] A. Aggarwal, B. Viswanath, L. Zhang, S. Kumar, A. Shah and P. Kumaraguru, “I Spy with My Little Eye: Analysis and Detection of Spying Browser Extensions,” 2018 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 47-61, 2018.
[5] Benjamin Eriksson, Pablo Picazo-Sanchez, Andrei Sabelfeld, “Hardening the Security Analysis of Browser Extensions,” 37th ACM/SIGAPP Symposium on Applied Computing, pp. 1694 - 1703, 2022.
[6] Bauer, Lujo and Cai, Shaoying and Jia, Limin and Passaro, Timothy and Tian, Yuan, “Analyzing the dangers posed by Chrome extensions,” 2014 IEEE Conference on Communications and Network Security, pp. 184-192, 2014.
[7] Nayak, Asmit and Khandelwal, Rishabh and Fernandes, Earlence and Fawaz, Kassem, “Experimental Security Analysis of Sensitive Data Access by Browser Extensions,” Proceedings of the ACM on Web Conference 2024, p. 1283–1294, 2024.
[8] “Chrome-States,” [線上]. Available: https://chrome-stats.com/.
[9] S. Agarwal, “Helping or Hindering?: How Browser Extensions Undermine Security,” Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 23-37, 11 2022.
[10] “Migrate to a service worker,” Chrome for Developers, 9 3 2023. [線上]. Available: https://developer.chrome.com/docs/extensions/develop/migrate/to-service-workers.
[11] “Persistent Service Worker in Chrome Extension,” Stack Overflow, 13 3 2021. [線上]. Available: https://stackoverflow.com/questions/66618136/persistent-service-worker-in-chrome-extension/66618269#66618269.
指導教授 許富皓(Fu-Hau Hsu) 審核日期 2024-7-19
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明