Localhost Detour from Public to Private Networks

Yehuda Afek, Anat Bremler-Barr*, Dor Israeli, Alon Noy

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

This paper presents a new localhost browser based vulnerability and corresponding attack that opens the door to new attacks on private networks and local devices. We show that this new vulnerability may put hundreds of millions of internet users and their IoT devices at risk. Following the attack presentation, we suggest three new protection mechanisms to mitigate this vulnerability. This new attack bypasses recently suggested protection mechanisms designed to stop browser-based attacks on private devices and local applications [18, 20].

Original languageEnglish
Title of host publicationCyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Proceedings
EditorsShlomi Dolev, Ehud Gudes, Pascal Paillier
PublisherSpringer Science and Business Media Deutschland GmbH
Pages1-17
Number of pages17
ISBN (Print)9783031346705
DOIs
StatePublished - 2023
Event7th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2023 - Be'er Sheva, Israel
Duration: 29 Jun 202330 Jun 2023

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume13914 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference7th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2023
Country/TerritoryIsrael
CityBe'er Sheva
Period29/06/2330/06/23

Keywords

  • Browser Based Attack
  • IoT
  • Localhost
  • Private Network

Fingerprint

Dive into the research topics of 'Localhost Detour from Public to Private Networks'. Together they form a unique fingerprint.

Cite this