firstname.lastname@example.org email@example.com firstname.lastname@example.org Weidong Shao Dan Boneh
Stanford University Stanford University
DNS rebinding attacks subvert the same-origin policy of browsers andconvert them into open network proxies. We survey new DNS rebinding attacks that exploit the interaction between browsers and their plug-ins, such as Flash Player and Java. These attacks can be used to circumvent ﬁrewalls and are highly cost-eﬀective for sending spam email and defrauding pay-per-click advertisers, requiring less than $100 to temporarily hijack 100,000 IP addresses. We show that theclassic defense against these attacks, called “DNS pinning,” is ineﬀective in modern browsers. The primary focus of this work, however, is the design of strong defenses against DNS rebinding attacks that protect modern browsers: we suggest easy-to-deploy patches for plug-ins that prevent large-scale exploitation, provide a defense tool, dnswall, that prevents ﬁrewall circumvention, and detail twodefense options, policy-based pinning and host name authorization.