{"id":"https://openalex.org/W2016004370","doi":"https://doi.org/10.1109/sp.2014.10","title":"All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API","display_name":"All Your Screens Are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API","publication_year":2014,"publication_date":"2014-05-01","ids":{"openalex":"https://openalex.org/W2016004370","doi":"https://doi.org/10.1109/sp.2014.10","mag":"2016004370"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/sp.2014.10","pdf_url":"https://ieeexplore.ieee.org/ielx7/6954656/6956545/06956555.pdf","source":{"id":"https://openalex.org/S4306418833","display_name":"IEEE Symposium on Security and Privacy","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://ieeexplore.ieee.org/ielx7/6954656/6956545/06956555.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100716456","display_name":"Yuan Tian","orcid":"https://orcid.org/0000-0002-2208-3893"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yuan Tian","raw_affiliation_strings":["Carnegie Mellon University"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036454642","display_name":"Ying Chuan Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ying Chuan Liu","raw_affiliation_strings":["Carnegie Mellon University"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086141275","display_name":"Amar Bhosale","orcid":null},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Amar Bhosale","raw_affiliation_strings":["Carnegie Mellon University"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001289664","display_name":"Lin Shung Huang","orcid":null},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lin Shung Huang","raw_affiliation_strings":["Carnegie Mellon University"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033964933","display_name":"Patrick Tague","orcid":"https://orcid.org/0000-0002-7561-6112"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Patrick Tague","raw_affiliation_strings":["Carnegie Mellon University"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010105359","display_name":"Collin Jackson","orcid":null},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Collin Jackson","raw_affiliation_strings":["Carnegie Mellon University"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University","institution_ids":["https://openalex.org/I74973139"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.858,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":13,"citation_normalized_percentile":{"value":0.723652,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":87,"max":88},"biblio":{"volume":null,"issue":null,"first_page":"34","last_page":"48"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9971,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/html5","display_name":"HTML5","score":0.7456226},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.45081007}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.80728364},{"id":"https://openalex.org/C84063617","wikidata":"https://www.wikidata.org/wiki/Q2053","display_name":"HTML5","level":2,"score":0.7456226},{"id":"https://openalex.org/C544833334","wikidata":"https://www.wikidata.org/wiki/Q2005","display_name":"JavaScript","level":2,"score":0.6081605},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5882002},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5808527},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.45081007},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.32562006}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/sp.2014.10","pdf_url":"https://ieeexplore.ieee.org/ielx7/6954656/6956545/06956555.pdf","source":{"id":"https://openalex.org/S4306418833","display_name":"IEEE Symposium on Security and Privacy","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.685.491","pdf_url":"http://ieee-security.org/TC/SP2014/papers/AllYourScreensareBelongtoUs_c_AttacksExploitingtheHTML5ScreenSharingAPI.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/sp.2014.10","pdf_url":"https://ieeexplore.ieee.org/ielx7/6954656/6956545/06956555.pdf","source":{"id":"https://openalex.org/S4306418833","display_name":"IEEE Symposium on Security and Privacy","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.78,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":17,"referenced_works":["https://openalex.org/W1705596515","https://openalex.org/W1729553147","https://openalex.org/W1896223928","https://openalex.org/W1974977720","https://openalex.org/W1998180710","https://openalex.org/W2057718232","https://openalex.org/W2072978486","https://openalex.org/W2078483465","https://openalex.org/W2102493164","https://openalex.org/W2103262407","https://openalex.org/W2103989381","https://openalex.org/W2133113868","https://openalex.org/W2149684006","https://openalex.org/W2161255891","https://openalex.org/W2169868363","https://openalex.org/W2338429729","https://openalex.org/W2746937343"],"related_works":["https://openalex.org/W602441967","https://openalex.org/W562146691","https://openalex.org/W4390142841","https://openalex.org/W2984839098","https://openalex.org/W2750121105","https://openalex.org/W2606134820","https://openalex.org/W2490499920","https://openalex.org/W2484907013","https://openalex.org/W2342903424","https://openalex.org/W2137830470"],"abstract_inverted_index":{"HTML5":[0,17],"changes":[1],"many":[2],"aspects":[3],"in":[4,13],"the":[5,15,22,30,48,51,54,76,107,111,114,118,122,147,150,181,184,203,206,211],"browser":[6,35],"world":[7],"by":[8],"introducing":[9],"numerous":[10],"new":[11,16,95,108],"concepts,":[12],"particular,":[14],"screen":[18,55,105,123,137,151,207,223],"sharing":[19,56,124,152,208,224],"API":[20,57,109,125,178],"impacts":[21],"security":[23,36,119],"implications":[24,120],"of":[25,29,80,113,121,149,183,197],"browsers":[26],"tremendously.":[27],"One":[28],"core":[31],"assumptions":[32],"on":[33],"which":[34],"is":[37,39,42,200],"built":[38],"that":[40,141],"there":[41],"no":[43],"cross-origin":[44,61,84],"feedback":[45,62,85],"loop":[46],"from":[47,75,103],"client":[49],"to":[50,70,201,218],"server.":[52],"However,":[53],"allows":[58],"creating":[59],"a":[60,220],"loop.":[63],"Consequently,":[64],"websites":[65,166],"will":[66],"potentially":[67],"be":[68,174],"able":[69],"see":[71],"all":[72],"visible":[73],"content":[74],"user's":[77],"screen,":[78],"irrespective":[79],"its":[81],"origin.":[82],"This":[83],"loop,":[86],"when":[87],"combined":[88],"with":[89,146],"human":[90],"vision":[91],"limitations,":[92],"can":[93,99,173],"introduce":[94],"vulnerabilities.":[96],"An":[97],"attacker":[98],"capture":[100],"sensitive":[101],"information":[102,160,193],"victim's":[104],"using":[106,176,205],"without":[110],"consensus":[112],"victim.":[115],"We":[116,139,162],"investigate":[117],"and":[126,159,170,179,192,214],"discuss":[127,163],"how":[128,164],"existing":[129],"defenses":[130,217],"against":[131],"traditional":[132],"web":[133],"attacks":[134,143,185,204],"fail":[135],"during":[136],"sharing.":[138],"show":[140],"several":[142],"are":[144],"possible":[145],"help":[148],"API:":[153],"cross-site":[154],"request":[155],"forgery,":[156],"history":[157],"sniffing,":[158],"stealing.":[161],"popular":[165],"such":[167,186],"as":[168,187],"Amazon":[169],"Wells":[171],"Fargo":[172],"attacked":[175],"this":[177,198],"demonstrate":[180],"consequences":[182],"economic":[188],"losses,":[189],"compromised":[190],"account":[191],"disclosure.":[194],"The":[195],"objective":[196],"paper":[199],"present":[202],"API,":[209],"analyze":[210],"fundamental":[212],"cause":[213],"motivate":[215],"potential":[216],"design":[219],"more":[221],"secure":[222],"API.":[225]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2016004370","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":4},{"year":2014,"cited_by_count":2}],"updated_date":"2024-12-15T21:56:31.271077","created_date":"2016-06-24"}