On the misuse of graphical user interface elements to implement security controls
dc.contributor.author | Mulliner, Collin | |
dc.contributor.author | Robertson, William | |
dc.contributor.author | Kirda, Engin | |
dc.date.accessioned | 2018-04-13T09:16:44Z | |
dc.date.available | 2018-04-13T09:16:44Z | |
dc.date.issued | 2017 | |
dc.description.abstract | GUIs are the predominant means by which users interact with modern programs. GUIs contain a number of common visual elements widgets such as buttons, textfields, and lists, and GUIs typically provide the ability to change attributes on these widgets to control their visibility and behavior. While these attributes are extremely useful to provide visual cues to users to guide them through an application's GUI, they can also be misused for purposes they were not intended. In particular, in the context of GUI-based applications that include multiple privilege levels within the application, GUI element attributes may be misused as a mechanism for enforcing access control policies. This work presents a method to detect misuse of user interface elements to implement access control, it is based on our earlier work1 that introduced the vulnerability class the we refer to as GEMs, or instances of GUI element misuse. Using our GEM detection method we discovered unknown vulnerabilities in several applications. | en |
dc.identifier.doi | 10.1515/itit-2016-0036 | |
dc.identifier.pissn | 1611-2776 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/16402 | |
dc.language.iso | en | |
dc.publisher | De Gruyter | |
dc.relation.ispartof | it - Information Technology: Vol. 59, No. 5 | |
dc.subject | Vulnerability analysis | |
dc.subject | graphical user interfaces | |
dc.subject | access control | |
dc.title | On the misuse of graphical user interface elements to implement security controls | en |
dc.type | Text/Journal Article | |
gi.citation.publisherPlace | Berlin | |
gi.citation.startPage | 59 | |
gi.conference.sessiontitle | Thematic Issue: Vulnerability Analysis |