New Attack Surfaces Against Emerging Cloud and Web Based Infrastructures and Defenses

Gardado en:
Detalles Bibliográficos
Publicado en:ProQuest Dissertations and Theses (2025)
Autor Principal: Xiong, Junjie
Publicado:
ProQuest Dissertations & Theses
Materias:
Acceso en liña:Citation/Abstract
Full Text - PDF
Etiquetas: Engadir etiqueta
Sen Etiquetas, Sexa o primeiro en etiquetar este rexistro!

MARC

LEADER 00000nab a2200000uu 4500
001 3225627242
003 UK-CbPIL
020 |a 9798286447091 
035 |a 3225627242 
045 2 |b d20250101  |b d20251231 
084 |a 66569  |2 nlm 
100 1 |a Xiong, Junjie 
245 1 |a New Attack Surfaces Against Emerging Cloud and Web Based Infrastructures and Defenses 
260 |b ProQuest Dissertations & Theses  |c 2025 
513 |a Dissertation/Thesis 
520 3 |a Emerging network security threats, ranging from cloud-based infrastructure attacks to web-based content subversion, pose significant challenges to modern computing environments. In this dissertation, we explore two novel attack vectors that disrupt both cloud-based infrastructures and web-based content systems.In this dissertation, we first introduce the Warmonger attack, a novel attack vector that can cause denial-of-service between a serverless computing platform and an external content server. The Warmonger attack exploits the fact that a serverless computing platform shares the same set of egress IPs among all serverless functions, which belong to different users, to access an external content server. As a result, a malicious user on this platform can purposefully misbehave and cause these egress IPs to be blocked by the content server, resulting in a platform-wide denial of service. To validate the Warmonger attack, we ran months-long experiments, collected and analyzed the egress IP usage pattern of four major serverless service providers (SSPs). We also conducted an in-depth evaluation of an attacker’s possible moves to attack an external server and cause IP blockage. We demonstrate that some SSPs use surprisingly small numbers of egress IPs and share them among their users, and that the serverless platform provides sufficient leverage for a malicious user to conduct well-known misbehaviors and cause IP-blockage. Our study unveiled a potential security threat on the emerging serverless computing platform, and shed light on potential mitigation approaches.In the second part of this work, we investigate security vulnerabilities in the use of fonts in digital documents and web pages, focusing on PDF documents and web-based emails. We find multiple attack surfaces that can be exploited by an adversary using malicious fonts. We conduct a comprehensive evaluation of Portable Document Format (PDF) documents collected from the real world to investigate how an attacker can bypass PDF signatures. We further evaluate the potential security threats that an attacker can bring to web-based emails. Our study shows that various security issues may be caused by the inappropriate use of fonts, which have nevertheless been overlooked in the past years. As such, guidelines promoting the secure use of fonts could be beneficial in reinforcing the security measures for digital documents and web pages. 
653 |a Computer engineering 
653 |a Web studies 
653 |a Artificial intelligence 
653 |a Information technology 
773 0 |t ProQuest Dissertations and Theses  |g (2025) 
786 0 |d ProQuest  |t ProQuest Dissertations & Theses Global 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3225627242/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3225627242/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch