Describe existing clickjacking attack strategies


Assignment

The goal of this problem is for you to read and summarize a research article. The article, provided on the course website, is "Clickjacking: Attacks and Defenses" by Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, and Collin Jackson, and was published in the 2012 USENIX Security Symposium. It is a more extensive study of the clickjacking attack we studied in class.

Your task is to read the paper and write a 2 to 3-page summary of the paper. Focus only up to (and including) Section 5.1.1 (of course, you are free to read the entire paper if you'd like). Your summary should not exceed 3 (single spaced) pages, but make sure it's not shorter than 2 pages. In particular, you should not simply copy and reuse paragraphs word by word from the paper, but use your own words to summarize the paper.

You will be evaluated on how well you have managed to:

• Define a clickjacking attack and describe its root cause

• Describe the considered attacker model

• Describe existing clickjacking attack strategies

• Describe existing defenses against clickjacking and their limitations

• Describe the new clickjacking attack variants proposed in the article

• Provide a description of the proposed InContext defense (general design goals for any clickjacking defense, how does InContext address the root cause of clickjacking attacks, high-level description of InContext defense)

• Provide your personal opinion about the proposed defense: provide arguments whether you believe or you don't believe that InContext is a good/appropriate defense mechanism, what are its strengths and weaknesses (consider things like its practicality, ease of use, ease of adoption, efficiency, etc.)

In addition, you will be graded on the clarity of your exposition. In essence, the goal of this summary is for a reader familiar with web-based attacks to be able to have a deeper understanding of current threats posed by clickjacking attacks.

Article: Clickjacking: Attacks and Defenses by Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter and Collin Jackson.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also include a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also Include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Computer Engineering: Describe existing clickjacking attack strategies
Reference No:- TGS02957015

Now Priced at $40 (50% Discount)

Recommended (93%)

Rated (4.5/5)