<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Google Data &#187; Panayiotis Mavrommatis</title>
	<atom:link href="/author/panayiotis-mavrommatis/feed/" rel="self" type="application/rss+xml" />
	<link>https://googledata.org</link>
	<description>Everything Google: News, Products, Services, Content, Culture</description>
	<lastBuildDate>Wed, 18 Mar 2015 18:30:00 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.7.5</generator>
	<item>
		<title>Safe Browsing Alerts for Network Administrators is graduating from Labs</title>
		<link>https://googledata.org/google-online-security/safe-browsing-alerts-for-network-administrators-is-graduating-from-labs/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=safe-browsing-alerts-for-network-administrators-is-graduating-from-labs</link>
		<comments>https://googledata.org/google-online-security/safe-browsing-alerts-for-network-administrators-is-graduating-from-labs/#comments</comments>
		<pubDate>Thu, 06 Oct 2011 16:54:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=585ded6a9cd4046fe669f7e2c0944d81</guid>
		<description><![CDATA[Posted by Nav Jagpal, Security TeamToday, we’re congratulating Safe Browsing Alerts for Network Administrators on its graduation from Labs to its new home at http://www.google.com/safebrowsing/alerts/We announced the tool about a year ago and have re...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Nav Jagpal, Security Team</span><br /><br />Today, we’re congratulating Safe Browsing Alerts for Network Administrators on its graduation from Labs to its new home at <a href="http://www.google.com/safebrowsing/alerts/">http://www.google.com/safebrowsing/alerts/</a><br /><br />We <a href="http://googleonlinesecurity.blogspot.com/2010/09/safe-browsing-alerts-for-network.html">announced</a> the tool about a year ago and have received a lot of positive feedback. Network administrators, large and small, are using the information we provide about malware and phishing URLs to clean up their networks and help webmasters make their sites safer. Earlier this year, <a href="http://searchsecurity.techtarget.com.au/news/2240035959/Winners-at-the-AusCERT-2011-awards-night">AusCert recognized our efforts</a> by awarding Safe Browsing Alerts for Network Administrators the title of “Best Security Initiative.” <br /><br />If you’re a network administrator and haven’t yet registered your AS, you can do so <a href="http://www.google.com/safebrowsing/alerts/">here</a>.]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/safe-browsing-alerts-for-network-administrators-is-graduating-from-labs/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Protecting users from malicious downloads</title>
		<link>https://googledata.org/google-online-security/protecting-users-from-malicious-downloads/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=protecting-users-from-malicious-downloads</link>
		<comments>https://googledata.org/google-online-security/protecting-users-from-malicious-downloads/#comments</comments>
		<pubDate>Tue, 05 Apr 2011 18:27:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=2ee6e63166d2ce0dbbc4eabe702b34c5</guid>
		<description><![CDATA[Posted by Moheeb Abu Rajab, Google Security Team For the past five years Google has been offering protection to users against websites that attempt to distribute malware via drive-by downloads — that is, infections that harm users’ computers when t...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Moheeb Abu Rajab, Google Security Team</span> <br /><br />For the past five years Google has been offering protection to users against websites that attempt to distribute malware via drive-by downloads — that is, infections that harm users’ computers when they simply visit a vulnerable site. The data produced by our systems and published via the <a href="http://code.google.com/apis/safebrowsing/">Safe Browsing API</a> is used by Google search and browsers such as Google Chrome, Firefox, and Safari to warn users who may attempt to visit these dangerous webpages. <br /><br />Safe Browsing has done a lot of good for the web, yet the Internet remains rife with deceptive and harmful content. It’s easy to find sites hosting free downloads that promise one thing but actually behave quite differently. These downloads may even perform actions without the user’s consent, such as displaying spam ads, performing click fraud, or stealing other users’ passwords. Such sites usually don’t attempt to exploit vulnerabilities on the user’s computer system. Instead, they use social engineering to entice users to download and run the malicious content.   <br /><br />Today we’re pleased to announce a new feature that aims to protect users against these kinds of downloads, starting with malicious Windows executables. The new feature will be integrated with Google Chrome and will display a warning if a user attempts to download a suspected malicious executable file:<br /><br /><div class="separator" style="clear: both; text-align: center;"><a href="http://3.bp.blogspot.com/-daarKD9UaMg/TZtdGDuxx3I/AAAAAAAC22k/4j6y3nM3MtE/s1600/warning.png" imageanchor="1" style=""><img border="0" height="53" width="400" src="http://3.bp.blogspot.com/-daarKD9UaMg/TZtdGDuxx3I/AAAAAAAC22k/4j6y3nM3MtE/s400/warning.png" /></a></div><center><i>Download warning</i></center><br /><br />This warning will be displayed for any download URL that matches the latest list of malicious websites published by the <a href="http://code.google.com/apis/safebrowsing/">Safe Browsing API</a>. The new feature follows the same <a href="http://www.google.com/chrome/intl/en/privacy.html">privacy policy</a> currently in use by the Safe Browsing feature. For example, this feature does not enable Google to determine the URLs you are visiting.<br /><br />We’re starting with a small-scale experimental phase for a subset of our users who subscribe to the Chrome development release channel, and we hope to make this feature available to all users in the next stable release of Google Chrome. We hope that the feature will improve our users’ online experience and help make the Internet a safer place.<br /><br />For webmasters, you can continue to use the same interface provided by <a href="https://www.google.com/webmasters/tools/">Google Webmaster Tools</a> to learn about malware issues with your sites. These tools include binaries that have been identified by this new feature, and the same <a href="http://googleonlinesecurity.blogspot.com/2009/10/malware-warning-review-process.html">review process</a> will apply.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-8114550924546216008?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/protecting-users-from-malicious-downloads/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Phishing URLs and XML Notifications</title>
		<link>https://googledata.org/uncategorized/phishing-urls-and-xml-notifications-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=phishing-urls-and-xml-notifications-2</link>
		<comments>https://googledata.org/uncategorized/phishing-urls-and-xml-notifications-2/#comments</comments>
		<pubDate>Thu, 14 Oct 2010 19:42:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=db00c2dbf6dfa66bd423355293769272</guid>
		<description><![CDATA[Posted by Nav Jagpal, Security teamRecently, we announced Safe Browsing Alerts for Network Administrators. Today we’re adding phishing URLs to the notification messages. This means that in addition to being alerted to compromised URLs found on networ...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Nav Jagpal, Security team</span><br /><br />Recently, we announced <a href="http://googleonlinesecurity.blogspot.com/2010/09/safe-browsing-alerts-for-network.html">Safe Browsing Alerts for Network Administrators</a>. Today we’re adding phishing URLs to the notification messages. This means that in addition to being alerted to compromised URLs found on networks, you’ll be alerted to phishing URLs as well.<br /><br />We’d also like to point out the XML notification feature. By default, we send notification messages in a simple email message. However, we realize that some of you may want to process these notifications by a script, so we’ve added the ability to receive messages in XML format. Click on an AS in your list to modify preferences, such as enabling the XML notification feature. If you decide to use XML email messages, you should familiarize yourself with the <a href="http://safebrowsingalerts.googlelabs.com/xml/message.xsd">XML Schema</a>.<br /><br />If you’re a network administrator and haven’t yet registered your AS, you can do so <a href="http://safebrowsingalerts.googlelabs.com/">here</a>.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-7429064483105091116?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/phishing-urls-and-xml-notifications-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Phishing URLs and XML Notifications</title>
		<link>https://googledata.org/google-online-security/phishing-urls-and-xml-notifications/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=phishing-urls-and-xml-notifications</link>
		<comments>https://googledata.org/google-online-security/phishing-urls-and-xml-notifications/#comments</comments>
		<pubDate>Thu, 14 Oct 2010 19:42:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Nav Jagpal, Security teamRecently, we announced Safe Browsing Alerts for Network Administrators. Today we’re adding phishing URLs to the notification messages. This means that in addition to being alerted to compromised URLs found on networ...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Nav Jagpal, Security team</span><br /><br />Recently, we announced <a href="http://googleonlinesecurity.blogspot.com/2010/09/safe-browsing-alerts-for-network.html">Safe Browsing Alerts for Network Administrators</a>. Today we’re adding phishing URLs to the notification messages. This means that in addition to being alerted to compromised URLs found on networks, you’ll be alerted to phishing URLs as well.<br /><br />We’d also like to point out the XML notification feature. By default, we send notification messages in a simple email message. However, we realize that some of you may want to process these notifications by a script, so we’ve added the ability to receive messages in XML format. Click on an AS in your list to modify preferences, such as enabling the XML notification feature. If you decide to use XML email messages, you should familiarize yourself with the <a href="http://safebrowsingalerts.googlelabs.com/xml/message.xsd">XML Schema</a>.<br /><br />If you’re a network administrator and haven’t yet registered your AS, you can do so <a href="http://safebrowsingalerts.googlelabs.com/">here</a>.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-7429064483105091116?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/phishing-urls-and-xml-notifications/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Safe Browsing Alerts for Network Administrators</title>
		<link>https://googledata.org/uncategorized/safe-browsing-alerts-for-network-administrators-2/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=safe-browsing-alerts-for-network-administrators-2</link>
		<comments>https://googledata.org/uncategorized/safe-browsing-alerts-for-network-administrators-2/#comments</comments>
		<pubDate>Tue, 28 Sep 2010 20:30:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false">https://googledata.org/?guid=ae238cb01fb42474e94cecbc20e946a8</guid>
		<description><![CDATA[Posted by Nav Jagpal and Ke Wang, Security TeamGoogle has been working hard to protect its users from malicious web pages, and also to help webmasters keep their websites clean. When we find malicious content on websites, we attempt to notify their web...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Nav Jagpal and Ke Wang, Security Team</span><br /><br />Google has been working hard to protect its users from malicious web pages, and also to help webmasters keep their websites clean. When we find malicious content on websites, we <a href="http://www.google.com/support/webmasters/bin/answer.py?answer=163633&amp;cbid=2dedoqqb8rxg&amp;src=cb&amp;lev=%20index#2">attempt to notify</a> their webmasters via email about the bad URLs. There is even a <a href="http://googleonlinesecurity.blogspot.com/2009/10/show-me-malware.html">Webmaster Tools feature</a> that helps webmasters identify specific malicious content that has been surreptitiously added to their sites, so that they can clean up their site and help prevent it from being compromised in the future. <br /><br />Today, we’re happy to announce <a href="http://safebrowsingalerts.googlelabs.com/">Google Safe Browsing Alerts for Network Administrators</a> -- an experimental tool which allows <a href="http://en.wikipedia.org/wiki/Autonomous_system_(Internet)">Autonomous System</a> (AS) owners to receive early notifications for malicious content found on their networks. A single network or ISP can host hundreds or thousands of different websites. Although network administrators may not be responsible for running the websites themselves, they have an interest in the quality of the content being hosted on their networks. We’re hoping that with this additional level of information, administrators can help make the Internet safer by working with webmasters to remove malicious content and fix security vulnerabilities.<br /><br />To get started, visit <a href="http://safebrowsingalerts.googlelabs.com/">safebrowsingalerts.googlelabs.com</a>.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-2256692314381830517?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/uncategorized/safe-browsing-alerts-for-network-administrators-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Safe Browsing Alerts for Network Administrators</title>
		<link>https://googledata.org/google-online-security/safe-browsing-alerts-for-network-administrators/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=safe-browsing-alerts-for-network-administrators</link>
		<comments>https://googledata.org/google-online-security/safe-browsing-alerts-for-network-administrators/#comments</comments>
		<pubDate>Tue, 28 Sep 2010 20:30:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Nav Jagpal and Ke Wang, Security TeamGoogle has been working hard to protect its users from malicious web pages, and also to help webmasters keep their websites clean. When we find malicious content on websites, we attempt to notify their web...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Nav Jagpal and Ke Wang, Security Team</span><br /><br />Google has been working hard to protect its users from malicious web pages, and also to help webmasters keep their websites clean. When we find malicious content on websites, we <a href="http://www.google.com/support/webmasters/bin/answer.py?answer=163633&amp;cbid=2dedoqqb8rxg&amp;src=cb&amp;lev=%20index#2">attempt to notify</a> their webmasters via email about the bad URLs. There is even a <a href="http://googleonlinesecurity.blogspot.com/2009/10/show-me-malware.html">Webmaster Tools feature</a> that helps webmasters identify specific malicious content that has been surreptitiously added to their sites, so that they can clean up their site and help prevent it from being compromised in the future. <br /><br />Today, we’re happy to announce <a href="http://safebrowsingalerts.googlelabs.com/">Google Safe Browsing Alerts for Network Administrators</a> -- an experimental tool which allows <a href="http://en.wikipedia.org/wiki/Autonomous_system_(Internet)">Autonomous System</a> (AS) owners to receive early notifications for malicious content found on their networks. A single network or ISP can host hundreds or thousands of different websites. Although network administrators may not be responsible for running the websites themselves, they have an interest in the quality of the content being hosted on their networks. We’re hoping that with this additional level of information, administrators can help make the Internet safer by working with webmasters to remove malicious content and fix security vulnerabilities.<br /><br />To get started, visit <a href="http://safebrowsingalerts.googlelabs.com/">safebrowsingalerts.googlelabs.com</a>.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-2256692314381830517?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/safe-browsing-alerts-for-network-administrators/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Meet skipfish, our automated web security scanner</title>
		<link>https://googledata.org/google-online-security/meet-skipfish-our-automated-web-security-scanner/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=meet-skipfish-our-automated-web-security-scanner</link>
		<comments>https://googledata.org/google-online-security/meet-skipfish-our-automated-web-security-scanner/#comments</comments>
		<pubDate>Fri, 19 Mar 2010 17:49:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Michal ZalewskiThe safety of the Internet is of paramount importance to Google, and helping web developers build secure, reliable web applications is an important part of the equation. To advance this goal, we have released projects such as r...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Michal Zalewski</span><br /><br />The safety of the Internet is of paramount importance to Google, and helping web developers build secure, reliable web applications is an important part of the equation. To advance this goal, we have released projects such as <a href="http://googleonlinesecurity.blogspot.com/2008/07/meet-ratproxy-our-passive-web-security.html">ratproxy</a>, a passive security assessment tool; and <a href="http://googleonlinesecurity.blogspot.com/2008/12/announcing-browser-security-handbook.html">Browser Security Handbook</a>, a comprehensive guide for web developers. We also worked with the community to <a href="http://googleonlinesecurity.blogspot.com/2009/07/improving-web-browser-security.html">improve the security of third-party browsers</a>.<br /><br />Today, we are happy to announce the availability of <b><a href="http://code.google.com/p/skipfish/">skipfish</a></b> - our free, open source, fully automated, active web application security reconnaissance tool. We think this project is interesting for a few reasons:<br /><ul><li><b>High speed</b>: written in pure C, with highly optimized HTTP handling and a minimal CPU footprint, the tool easily achieves 2000 requests per second with responsive targets.<br/><br /></li><li><b>Ease of use</b>: the tool features heuristics to support a variety of quirky web frameworks and mixed-technology sites, with automatic learning capabilities, on-the-fly wordlist creation, and form autocompletion.<br/><br /></li><li><b>Cutting-edge security logic</b>: we incorporated high quality, low false positive, differential security checks capable of spotting a range of subtle flaws, including blind injection vectors.<br/></li></ul>As with <i>ratproxy</i>, we feel that <i>skipfish</i> will be a valuable contribution to the information security community, making security assessments significantly more accessible and easier to execute.<br /><br />To download the scanner, please visit <a href="http://code.google.com/p/skipfish">this page</a>; detailed project documentation is <a href="http://code.google.com/p/skipfish/wiki/SkipfishDoc">available here</a>.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-869401333586698488?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/meet-skipfish-our-automated-web-security-scanner/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Do machines dream of electric malware?</title>
		<link>https://googledata.org/google-online-security/do-machines-dream-of-electric-malware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=do-machines-dream-of-electric-malware</link>
		<comments>https://googledata.org/google-online-security/do-machines-dream-of-electric-malware/#comments</comments>
		<pubDate>Thu, 29 Oct 2009 22:17:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by: Oliver Fisher, Anti-Malware TeamWe've explored Google's anti-malware processes several times recently, as well as our efforts to work with webmasters to help protect their users. However, there's been some confusion about the objectivity of ...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by: Oliver Fisher, Anti-Malware Team</span><br /><br />We've explored Google's <a href="http://googleonlinesecurity.blogspot.com/2009/10/malware-warning-review-process.html">anti-malware processes</a> several times recently, as well as our efforts to work with webmasters to help protect their users. However, there's been some confusion about the objectivity of our scanning and flagging procedures.<br /><br />Google uses fully automated systems to scan the Internet for potentially dangerous sites. These systems help detect sites infected with malware and then add a warning that appears in Google search results and in many web browsers. We flag sites in this way to help protect users who might visit them. The warning is a cautionary page, and we never prevent users from viewing the affected site if they choose. It's important to note that sites are often compromised without the webmaster's knowledge, so we provide affected webmasters with further information on the issues we've identified — including <a href="http://googleonlinesecurity.blogspot.com/2009/10/show-me-malware.html">showing snippets of the malicious code we find</a>. We also offer free resources in Google <a href="http://www.google.com/webmasters/tools">Webmaster Tools</a> to help site owners clean their sites and request a re-scan.<br /><br />Site owners sometimes say that we've made a mistake and that their site does not contain malware. For example, the recent appearance of a malware warning on people.com.cn sparked discussion about how Google flags websites. Our scanners — which are automated and indifferent to a site's subject matter — first found a malicious ad on the book.people.com.cn domain at approximately 3:47 a.m. PT on October 17, 2009. Over several days, the scanners detected thousands of URLs with suspicious content in other people.com.cn domains.<br /><br />Malicious content can be very difficult to detect. A previous post on this blog offered <a href="http://googleonlinesecurity.blogspot.com/2009/10/best-practices-for-verifying-and.html">tips for finding hidden malware and cleaning up websites</a>. There are also good tips on Google's <a href="http://googlewebmastercentral.blogspot.com/2008/04/my-sites-been-hacked-now-what.html">Webmaster Central Blog</a>. If a webmaster has indeed removed the malicious content and filed a malware review request in <a href="http://www.google.com/webmasters/tools">Webmaster Tools</a>, the warning label will be removed shortly. If it persists, however, it's very likely that dangerous content remains. Our scanners are highly accurate, and false positives are extremely rare.<br /><br />When Google's automated systems detect dangerous content on a site, an email is sent to <a href="http://www.google.com/support/webmasters/bin/answer.py?answer=45432#2">several administrative email addresses</a> at the site, as well as to the corresponding <a href="http://www.google.com/webmasters/tools">Webmaster Tools</a> account if one exists. We sent a notification to people.com.cn at 11:01 a.m. PT on October 17, just as any compromised site would receive. The email includes an explanation of how the site may have become compromised and unknowingly been distributing malware. It also describes the process of removing malware from the site and getting the Google warning removed from the site. A copy of the message sent to the addresses associated with infected sites is below:<br /><br /><div style="padding-left: 4em;"><br />We recently discovered that some of your pages can cause users to be infected with malicious software. We have begun showing a warning page to users who visit these pages by clicking a search result on Google.com.<br />...<br />We strongly encourage you to investigate this immediately to protect your visitors. Although some sites intentionally distribute malicious software, in many cases the webmaster is unaware because:<br />1) the site was compromised<br />2) the site doesn't monitor for malicious user-contributed content<br />3) the site displays content from an ad network that has a malicious advertiser<br /><br />If your site was compromised, it's important to not only remove the malicious (and usually hidden) content from your pages, but to also identify and fix the vulnerability. We suggest contacting your hosting provider if you are unsure of how to proceed. StopBadware also has a resource page for securing compromised sites: <a href="http://www.stopbadware.org/home/security">http://www.stopbadware.org/home/security</a> Once you've secured your site, you can request that the warning be removed by visiting <a href="http://www.google.com/support/webmasters/bin/answer.py?answer=45432">http://www.google.com/support/webmasters/bin/answer.py?answer=45432</a> and requesting a review. If your site is no longer harmful to users, we will remove the warning.<br /></div><br /><br />As the email says, the fastest way for a site to be removed from the malware list is for the webmaster to file a review request via Google <a href="http://www.google.com/webmasters/tools">Webmaster Tools</a>. Google's automated scanners will periodically re-examine the site even if no such request is received, but the process will take longer. People.com.cn did not file a review request, but our scanners reviewed the site on October 23 and removed the malware warning after finding that the malicious ad was gone.<br /><br />Malicious display ads are an increasingly common way for sites to unknowingly distribute malware. We recently wrote about the steps that Google takes to help <a href="http://googleonlinesecurity.blogspot.com/2009/10/protecting-users-and-ads-from-malware.html">protect our advertising networks</a>. Also, other publishers have recently written about <a href="http://www.businessinsider.com/henry-blodget-gawker-scammed-by-malware-pretending-to-be-suzuki-2009-10">their experiences with deceptive display ads</a>.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-7494445285413599540?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/do-machines-dream-of-electric-malware/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Best Practices for Verifying and Cleaning up a Compromised Site</title>
		<link>https://googledata.org/google-online-security/best-practices-for-verifying-and-cleaning-up-a-compromised-site/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=best-practices-for-verifying-and-cleaning-up-a-compromised-site</link>
		<comments>https://googledata.org/google-online-security/best-practices-for-verifying-and-cleaning-up-a-compromised-site/#comments</comments>
		<pubDate>Thu, 22 Oct 2009 17:38:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Written by Panayiotis Mavrommatis, Security Team As part of Cyber Security Awareness Month, Google's Anti-Malware Team is publishing a series of educational blog posts inspired by questions we've received from users. October is a great time to brush up...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Written by Panayiotis Mavrommatis, Security Team </span><br /><br /><span style="font-style:italic;">As part of Cyber Security Awareness Month, Google's Anti-Malware Team is publishing a series of educational blog posts inspired by <a href="http://www.google.com/url?sa=D&q=http://googleonlinesecurity.blogspot.com/2009/08/ask-google-anti-malware-team.html">questions we've received from users</a>. October is a great time to brush up on cyber security tips and ensure you're taking the necessary steps to protect your computer, website, and personal information. For general cyber security tips, check out <a href="http://www.google.com/url?sa=D&q=http://googleblog.blogspot.com/search/label/security">our online security educational series</a> or visit <a href="http://www.staysafeonline.org/">http://www.staysafeonline.org/</a>. To learn more about malware detection and site cleanup, visit the <a href="http://www.google.com/support/webmasters/">Webmaster Tools Help Center</a> and <a href="http://www.google.com/support/forum/p/Webmasters?hl=en">Forum</a>.</span><br /><br />In our <a href="http://googleonlinesecurity.blogspot.com/2009/10/malware-warning-review-process.html">last post</a> in this series, we explained Google's malware scanning process and how malware warning reviews work. It's not always clear to webmasters how to go about cleaning up their sites once they've been compromised, so this time we thought we'd share some best practices.<br /><br /><br /><span style="font-weight:bold;">1) Verify Your Site with Google Webmaster Tools<br /></span><br />If you have <a href="http://www.google.com/support/webmasters/bin/answer.py?answer=34592">added and verified your site's ownership</a> with Google Webmaster Tools, you can view a partial list of URLs where our system has detected suspicious content on your site, as well as <a href="http://googleonlinesecurity.blogspot.com/2009/10/show-me-malware.html">samples of the malicious code</a>. Once you've thoroughly cleaned up your site and addressed the vulnerability that allowed it to be compromised, it's easy to request a review through Webmaster Tools. We recognize that some site owners may want to use these tools even if they haven't already signed up with Webmaster Tools. For that reason, we enable you to verify ownership of your sites at any time, even if our systems have listed them as potentially dangerous.<br /><br /><span style="font-weight:bold;">2) If Your Site Has Been Compromised, Perform a Comprehensive Cleanup<br /></span><br />If any part of your site has been compromised, thoroughly check all pages on the site for harmful code or content — not just the example <a href="http://googleonlinesecurity.blogspot.com/2009/10/show-me-malware.html">pages listed in Webmaster Tools</a>. Be sure to identify and address the underlying vulnerability that led to the compromise, or else reinfection is likely to occur.<br /><br /><span style="font-weight:bold;">Remember to Check Your Web Server Configuration<br /></span><br />In addition to checking the contents of your site's pages and web server source code, remember to check that your web server configuration has not been modified by any intruders. If your web server has been compromised, your site's error pages can be modified to include custom HTML that actually redirects visitors to malicious sites.<br /><br /><span style="font-weight:bold;">Deleted &amp; Error Pages: Dark Corners of Your Website Where Malware May Be Lurking<br /></span><br />When a page is deleted from a site, the web server returns an error code (usually 404: Not Found) when requests to the "deleted" URLs are made. In addition to the error code in the HTTP header, the web server may send a custom error page or "Not Found" page, usually intended to help users find what they are looking for. If your site is infected, its error page can contain arbitrary HTML that exposes your visitors to malware. You can search our Webmaster Forum for information about how others are dealing with <a href="http://www.google.com/support/webmasters/bin/search.py?ctx=en:searchbox&query=htaccess+malware+more:forum&forum=1&temp_query=htaccess+malware">similar problems</a>. The recently-launched malware samples feature in Google Webmaster Tools could also come in handy.<br /><br /><span style="font-weight:bold;">3) If You Switch Hosting Providers, Disable Access to the Old Version of Your Site<br /></span><br />When a site is moved to a different hosting provider, the DNS records are updated such that the domain name points to a new IP address. In some cases, DNS caching can cause your domain name to continue resolving to the old IP address for some visitors even after the site has moved. For this reason, we recommend instructing your former hosting provider to stop serving any content for your site. This may cause some visitors to experience server errors for a few hours, but can protect them from visiting a potentially dangerous web server.<br /><br /><br />As always, our <a href="http://www.google.com/support/forum/p/Webmasters/label?lid=2fe2a8ee8e37c08e&hl=en">Webmaster Forum</a> and StopBadware's <a href="http://badwarebusters.org/">BadwareBusters</a> can be good sources of help and information when cleaning up a compromised site.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-4102802185509138261?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/best-practices-for-verifying-and-cleaning-up-a-compromised-site/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Show Me the Malware!</title>
		<link>https://googledata.org/google-online-security/show-me-the-malware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=show-me-the-malware</link>
		<comments>https://googledata.org/google-online-security/show-me-the-malware/#comments</comments>
		<pubDate>Mon, 12 Oct 2009 22:53:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[written by Lucas Ballard, on behalf of the Anti-Malware, Anti-Malvertising, and Webmaster Tools teamsAs part of Cyber Security Awareness Month, we're highlighting cyber security tips and features to help ensure you're taking the necessary steps to prot...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">written by Lucas Ballard, on behalf of the Anti-Malware, Anti-Malvertising, and Webmaster Tools teams</span><br /><br /><i>As part of Cyber Security Awareness Month, we're highlighting cyber security tips and features to help ensure you're taking the necessary steps to protect your computer, website, and personal information. For general cyber security tips, check out <a  href="http://googleblog.blogspot.com/search/label/security">our online security educational series</a> or visit <a  href="http://www.staysafeonline.org/">http://www.staysafeonline.org/</a>. To learn more about malware detection and site cleanup, visit the <a  href="http://www.google.com/support/webmasters/">Webmaster Tools Help Center</a> and <a  href="http://www.google.com/support/forum/p/Webmasters?hl=en">Forum</a>.</i><br /><br />To help protect users against malware threats, Google has built <a href="http://googleonlinesecurity.blogspot.com/2007/05/introducing-googles-anti-malware.html" >automated scanners</a> that detect malware on websites we've indexed. Pages that are identified as dangerous by these scanners are accompanied by warnings in Google search results, and browsers such as Google Chrome, Firefox, and Safari also use our data to show similar warnings to people attempting to visit suspicious sites.<br /><br />While it is important to protect users, we also know that most of these sites are not intentionally distributing malware. We understand the frustration of webmasters whose sites have been compromised without their knowledge and who discover that their site has been flagged. We proactively offer help to these webmasters: we send email to site administrators when we encounter suspicious content, we provide a list of infected pages in Webmaster Tools, and we maintain a service that allows webmasters to notify us when they have cleaned their sites. Read more about this process in the <a href="http://googleonlinesecurity.blogspot.com/2009/10/malware-warning-review-process.html" >previous post</a> on this blog.<br /><br />We're happy to announce that we've launched a feature that enables Google to provide even more detailed help to webmasters. Webmaster Tools now provides webmasters with samples of the malicious code that Google's automated scanners detected on their sites. These samples — which typically take the form of injected HTML tags, JavaScript, or embedded Flash files — are available in the "Malware details" <a href="http://googlewebmastercentral.blogspot.com/2009/10/fetch-as-googlebot-and-malware-details.html">Labs feature</a> in <a href="http://www.google.com/webmasters/tools" >Webmaster Tools</a>. Registered webmasters (registration is free) of infected sites do not need to specially enable the feature — they will find links to it on the Webmaster Tools dashboard. Webmasters will see a list of their pages that we found to be involved in malware distribution and samples of the malicious content that Google's scanners encountered on each infected page. In certain situations we can identify the underlying cause of the malicious code, and we'll provide these details when possible. We hope that the additional information will assist webmasters and help prevent their visitors from being exposed to malware.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_LMSk7hTEaIE/StO1DrITlXI/AAAAAAABihI/MQI4glmTxOo/s1600-h/details3.png"><img style="padding: 10px; border: 1px solid #ccc; cursor:pointer; cursor:hand;width: 400px; height: 283px;" src="http://3.bp.blogspot.com/_LMSk7hTEaIE/StO1DrITlXI/AAAAAAABihI/MQI4glmTxOo/s400/details3.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5391852253614413170" /></a><br /><i>Malware details for your site</i><br /><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_LMSk7hTEaIE/StO1ZljKk-I/AAAAAAABihQ/RnazzM4ewog/s1600-h/details4.png"><img style="padding: 10px; border: 1px solid #ccc; cursor:pointer; cursor:hand;width: 400px; height: 280px;" src="http://2.bp.blogspot.com/_LMSk7hTEaIE/StO1ZljKk-I/AAAAAAABihQ/RnazzM4ewog/s400/details4.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5391852630073578466" /></a><br /><i>Malware details for a particular page</i><br /><br /><br />While we're excited to offer this feature, we caution webmasters to use the tool only as a starting point in their site clean-up process. Google's scanners may not be able to provide malware samples in all cases, and the malware samples may not be a complete list of all the malware on the page. More importantly, we advise against simply removing the examples that are displayed in Webmaster Tools. If the underlying vulnerability is not identified and patched, it is likely that the site will be compromised again.<br /><br />In addition to helping the webmasters of sites with malware warnings, this new detail is also designed to promote the general health of the web. In some cases, our automatic scanners find questionable content on a site but do not have enough data to add it to the malware list. The new "Malware details" feature will highlight these instances to webmasters early on to help them identify and address security vulnerabilities more quickly.<br /><br />We hope you never have cause to use this feature, but if you do, it should help you quickly purge malware from your site and help protect its visitors.  We plan to improve our algorithms in the upcoming months to provide even greater coverage, more accurate vulnerability identification, and faster delivery to webmasters.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-2114433037386745693?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/show-me-the-malware/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>The Malware Warning Review Process</title>
		<link>https://googledata.org/google-online-security/the-malware-warning-review-process/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-malware-warning-review-process</link>
		<comments>https://googledata.org/google-online-security/the-malware-warning-review-process/#comments</comments>
		<pubDate>Fri, 09 Oct 2009 17:38:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[written by Lucas Ballard and Ke Wang, Anti-Malware TeamAs part of Cyber Security Awareness Month, Google's Anti-Malware Team is publishing a series of educational blog posts inspired by questions we've received from users. October is a great time to br...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">written by Lucas Ballard and Ke Wang, Anti-Malware Team</span><br /><br /><i>As part of Cyber Security Awareness Month, Google's Anti-Malware Team is publishing a series of educational blog posts inspired by <a  href="http://googleonlinesecurity.blogspot.com/2009/08/ask-google-anti-malware-team.html">questions we've received from users</a>. October is a great time to brush up on cyber security tips and ensure you're taking the necessary steps to protect your computer, website, and personal information. For general cyber security tips, check out <a  href="http://googleblog.blogspot.com/search/label/security">our online security educational series</a> or visit <a   href="http://www.staysafeonline.org/">http://www.staysafeonline.org/</a>. To learn more about malware detection and site cleanup, visit the <a   href="http://www.google.com/support/webmasters/">Webmaster Tools Help Center</a> and <a  href="http://www.google.com/support/forum/p/Webmasters?hl=en">Forum</a>.</i><br /><br />Google's anti-malware efforts are designed to be helpful to both webmasters and website visitors. Google continuously scans our web index for pages that could be dangerous to site visitors. When we find such pages, we flag them as harmful in our search results, and also provide this data to several browsers so that users of these browsers will receive warnings directly. We undertake this process as part of our security philosophy: we believe that if we all work together to identify threats and stamp them out, we can make the web a safer place for everyone. While we believe these processes are important steps in helping to protect our users, we also understand the frustration felt by the webmasters of flagged sites. This is why we notify webmasters as soon as we discover that their sites have been compromised. Additionally, we provide webmasters with a <a href="http://googlewebmastercentral.blogspot.com/2007/08/malware-reviews-via-webmaster-tools.html"  >tool to file a review</a> once they have cleaned their site. The review process works as follows.<br /><br /><b>Part 1: The webmaster's job:</b> The first step is site cleanup. The webmaster should remove all harmful content from the site. We realize that it can be tricky to find all the infections on a website, and webmasters should look thoroughly if the warning label persists. Keep in mind that if your site contains elements from another website that may have been compromised, it will remain flagged. This is because your site could still introduce harm to visitors. To prevent reinfection, the webmaster should also identify and fix the underlying software vulnerability that led to site compromise in the first place. For a guide on how to do this, visit <a href="http://stopbadware.org/home/security/" >stopbadware.org/home/security</a>.<br /><br />Once a webmaster has cleaned up the site, a Malware Review can be filed with Google's Webmaster Tools (please note that a Malware Review request is not the same as an <a href="http://www.google.com/support/webmasters/bin/answer.py?answer=35843" >Index Reinclusion request</a>).  The process for Malware Review is as follows:<br /><ol><li>Log in to <a href="https://www.google.com/webmasters/tools/home" >Webmaster Tools</a>.</li><li>From the Tool's home page click on the link to the site that is being flagged.  This will bring you to the site's Dashboard.</li><li>There should be a large red banner across the top of the dashboard that says "This site may be distributing malware." Clicking on the link that says "More Details" expands the dashboard to reveal a list of pages on the site that were found to be malicious.</li><li>Below this list is a link that says "Request a review." A webmaster can fill out this form and click the "Request a review" button to initiate the review process.</li></ol><a href="http://googlewebmastercentral.blogspot.com/2008/10/malware-we-dont-need-no-stinking.html" >More detailed instructions can be found here</a>.<br /><br /><br /><b>Part 2: Our job:</b> Upon receiving a Malware Review request, an automated set of algorithms verifies that the site has been cleaned. These algorithms revisit a subset of both the malicious and non-malicious pages that were scanned when the site was originally flagged. Additionally, these algorithms test some pages that were not originally scanned. If none of the tested pages are found to be malicious, the site is deemed to be safe, and warnings are removed from search results. A typical appeal takes only several hours to complete, although in some cases the process may take up to one day.<br /><br />In addition to processing appeal requests from webmasters, we also rescan compromised sites periodically. <br /><br />We encourage webmasters of infected sites to quickly clean their web pages and proactively request reviews through Webmaster Tools. After the site has been thoroughly cleaned and reviewed, it will no longer show a warning on Google's search results pages or through the browsers making use of our data.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-9193658527308380296?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/the-malware-warning-review-process/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Ask the Google Anti-Malware Team</title>
		<link>https://googledata.org/google-online-security/ask-the-google-anti-malware-team/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ask-the-google-anti-malware-team</link>
		<comments>https://googledata.org/google-online-security/ask-the-google-anti-malware-team/#comments</comments>
		<pubDate>Fri, 14 Aug 2009 19:10:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Fabrice JaubertThe Google Anti-Malware engineering team knows you have many questions related to our scanning and flagging of infected sites, some with short and simple answers and some with more complex answers. The short-answer questions ar...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Fabrice Jaubert</span><br /><p>The Google Anti-Malware engineering team knows you have many questions related to our <a href="http://googlewebmastercentral.blogspot.com/2008/10/malware-we-dont-need-no-stinking.html" >scanning and flagging of infected sites</a>, some with short and simple answers and some with more complex answers. The short-answer questions are already -- we hope -- adequately handled on the Webmaster Forums; now we want to do a better job at answering the more complex questions.<br /><p>To this end, we have created <a href="http://moderator.appspot.com/#15/e=a77ea&t=a9521">a Google Moderator page</a> for you to submit your questions, and to vote on other webmasters' questions. In two weeks (on Friday the 28th of August), we will close the page and select a few of the top-rated questions. Over the course of the next several weeks, we will do our best to answer each of these in a write-up, to be published here and to the <a href="http://www.google.com/support/forum/p/Webmasters/label?lid=2fe2a8ee8e37c08e&amp;hl=en">Webmaster Malware Forum</a>.</p><p>We hope to repeat this exercise (with a fresh Moderator page) in the fall to give you the opportunity to ask more questions.<br /></p><p>Thank you, and see you on <a href="http://moderator.appspot.com/#15/e=a77ea&t=a9521">the Moderator page</a>!</p><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-7804338813506518446?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/ask-the-google-anti-malware-team/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Reducing XSS by way of Automatic Context-Aware Escaping in Template Systems</title>
		<link>https://googledata.org/google-online-security/reducing-xss-by-way-of-automatic-context-aware-escaping-in-template-systems/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=reducing-xss-by-way-of-automatic-context-aware-escaping-in-template-systems</link>
		<comments>https://googledata.org/google-online-security/reducing-xss-by-way-of-automatic-context-aware-escaping-in-template-systems/#comments</comments>
		<pubDate>Tue, 31 Mar 2009 21:06:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Jad S. Boutros, Security TeamBuilding on our earlier posts on defenses against web application flaws ["Automating Web Application Security Testing", "Meet ratproxy, our passive web security assessment tool"], we introduce Automatic Context-Aw...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Jad S. Boutros, Security Team</span><br /><p>Building on our earlier posts on defenses against web application flaws [<a href="http://googleonlinesecurity.blogspot.com/2007/07/automating-web-application-security.html">"Automating Web Application Security Testing"</a>, <a href="http://googleonlinesecurity.blogspot.com/2008/07/meet-ratproxy-our-passive-web-security.html">"Meet ratproxy, our passive web security assessment tool"</a>], we introduce Automatic Context-Aware Escaping (Auto-Escape for short), a functionality we added to two Google-developed general purpose template systems to better protect against Cross-Site Scripting (XSS).<br /></p><p>We developed Auto-Escape specifically for general purpose template systems; that is, template systems that are for the most part unaware of the structure and programming language of the content on which they operate. These template systems typically provide minimal support for web applications, possibly limited to basic escaping functions that a developer can invoke to help escape unsafe content being returned in web responses. Our observation has been that web applications of substantial size and complexity using these template systems have an increased risk of introducing XSS flaws. To see why this is the case, consider the simplified template below in which double curly brackets <code>{{</code> and <code>}}</code> enclose placeholders (variables) that are replaced with run-time content, presumed unsafe.<br /></p><pre><br />&lt;body&gt;<br />  &lt;span style="color:{{USER_COLOR}};"&gt;<br />    Hello {{USERNAME}}, view your &lt;a href="{{USER_ACCOUNT_URL}}"&gt;Account&lt;/a&gt;.<br />  &lt;/span&gt;<br />  &lt;script&gt;<br />    var id = {{USER_ID}}; // some code using id, say:<br />    // alert("Your user ID is: " + id);<br />  &lt;/script&gt;<br />&lt;/body&gt;<br /></pre><p>In this template, four variables are used (not in this order):<br /></p><ul><li><i>USER_NAME</i> is inserted into regular HTML text and hence can be escaped safely by HTML-escape.<br /></li><li><i>USER_ACCOUNT_URL</i> is inserted into an HTML attribute that expects a URL and therefore in addition to HTML-escape, also requires validation that the URL scheme is safe. By allowing only a safe white-list of schemes, we can prevent (say) <code>javascript:</code> pseudo-URLs, which HTML-escape alone does not prevent.<br /></li><li><i>USER_COLOR</i> is inserted into a Cascading Style Sheets (CSS) context and therefore requires an escaping that also prevents scripting and other dangerous constructs in CSS such as those possible in <code>expression()</code> or <code>url()</code>. For more information on concerns with harmful content in CSS, refer to the CSS section of the <a href="http://code.google.com/p/browsersec/wiki/Part1#Cascading_stylesheets">Browser Security Handbook</a>.<br /></li><li><i>USER_ID</i> is inserted into a Javascript variable that expects a number as it is not enclosed in quotes. As such, it requires an escaping that coerces it to a number (which a typical Javascript-escape function does not do), otherwise it can lead to arbitrary javascript execution. More variants may be developed to coerce content to other data types, including arrays and objects.<br /></li></ul><p>Each of these variable insertions requires a different escaping method or risks introducing XSS. To keep the example small, we excluded several contexts of interest, particularly style tags, HTML attributes that expect Javascript (such as <code>onmouseover</code>), and considerations of whether attribute values are enclosed within quotes or not (which also affects escaping).<br /></p><h4>Auto-Escape<br /></h4><p>The example above demonstrates the importance of understanding the precise context in which variables are being inserted and the need for escaping functions that are both safe and correct for each. For larger and complex web applications, we notice two related vectors for XSS:<br /></p><ol><li>A developer forgetting to apply escaping to a given variable.<br /></li><li>A developer applying the wrong escaping for that variable for the context in which it is being inserted.<br /></li></ol><p>Considering the sheer number of templates in large web applications and the number of untrusted content they may operate on, the process of proper escaping becomes complicated and error prone. It is also difficult to efficiently audit from a security testing perspective. We developed Auto-Escape to take that complexity away from the developer and into the template system and therefore reduce the risks of XSS that would have ensued.<br /></p><h4>A Look at Implementation<br /></h4><p>Auto-Escape is a functionality designed to make the Template System web application context-aware and therefore able to apply automatically and properly the escaping required. This is achieved in three parts:<br /></p><ol><li>We determined all the different contexts in which untrusted content may be returned and provided proper escaping functions for each. This is part science and part practical. For example, we did not find the need to support variable insertion inside an HTML tag name itself (as opposed to HTML attributes) so we did not build support for it. Other factors come into play, including availability of existing escaping functions and backwards compatibility. As a result, part of that work is template system dependent.<br /></li><br /><li>We developed our own parser to parse HTML and Javascript templates. It provides methods which can be queried at a point of interest to obtain the context information necessary for proper escaping. The parser is designed with performance in mind, and it runs in a stream mode without look-ahead. It aims for simplicity while understanding that browsers may be more lenient than specifications, particularly in certain corner cases.<br /></li><br /><li>We added an extra step into the parsing that the template system already performs to locate variables, among other needs. This extra step activates our HTML/Javascript parser, queries it for the context of each variable then applies its escaping rules to compute the proper escaping functions to use for each variable. Depending on the template system, this step may be performed only the first time a template is used or for each web response in which case some limitations may be lifted.<br /></li></ol><p>A simple mechanism is provided for the developer to indicate that some variables are safe and should not be escaped. This is used for variables that are either escaped through other means in source code or contain trusted markup that should be emitted intact.<br /></p><h4>Current Status<br /></h4><p>Auto-Escape has been released with the C++ <a href="http://code.google.com/p/google-ctemplate/">Google Ctemplate</a> for a while now and it continues to develop there. You can read more about it in the <a href="http://google-ctemplate.googlecode.com/svn/trunk/doc/auto_escape.html">Guide to using Auto-Escape</a>. We also implemented Auto-Escape for the <a href="http://www.clearsilver.net/">ClearSilver</a> template system and expect it to be released in the near future. Lastly, we are in the process of integrating it into other template systems developed at Google for Java and Python and are interested in working with a few other open source template systems that may benefit from this logic. Our HTML/Javascript parser is already available with the Google Ctemplate distribution and is expected to be released as a stand-alone open source project very soon.<br /></p><pre>Co-developers: Filipe Almeida and Mugdha Bendre</pre><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-7291320788164226863?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/reducing-xss-by-way-of-automatic-context-aware-escaping-in-template-systems/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>OAuth for Secure Mashups</title>
		<link>https://googledata.org/google-online-security/oauth-for-secure-mashups/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=oauth-for-secure-mashups</link>
		<comments>https://googledata.org/google-online-security/oauth-for-secure-mashups/#comments</comments>
		<pubDate>Wed, 19 Nov 2008 01:41:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Eric Sachs, Senior Product Manager, Google SecurityA year ago, a number of large and small websites announced a new open standard called OAuth. This standard is designed to provide a secure and privacy-preserving technique for enabling specif...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Eric Sachs, Senior Product Manager, Google Security</span><br /><br />A year ago, a number of large and small websites announced a new open standard called <a href="http://oauth.net/" id="hz33" title="OAuth">OAuth</a>. This standard is designed to provide a secure and privacy-preserving technique for enabling specific private data on one site to be accessed by another site.  One popular reason for that type of cross-site access is data portability in areas such as personal health records (such as Google Health or Microsoft Healthvault), as well as social networks (such as OpenSocial enabled sites). I originally became involved in this space in the summer of 2005, when Google started developing a feature called <a href="http://code.google.com/apis/accounts/docs/AuthSub.html" id="e3yh" title="AuthSub">AuthSub</a>, which was one of the pre-cursors of OAuth. That was a proprietary protocol, but one that has been used by hundreds of websites to provide add-on services to Google Account users by getting permission from users to access data in their Google Accounts.  In fact, that was the key feature that a few of us used to start the Google Health portability effort back when it was only a prototype project with a few dedicated Googlers.  <div id="zq.s" style="margin-top: 0px; margin-bottom: 0px;"><br /></div>  <div id="zq.s1" style="margin-top: 0px; margin-bottom: 0px;"> However, with the development of a common Internet standard in OAuth, we see much greater potential for data portability and secure mash-ups. Today we <a href="http://igoogledeveloper.blogspot.com/2008/11/sign-in-to-myspace-aol-mail-and-google.html">announced</a> that the gadget platform now supports OAuth, and the interoperability of this standard was demonstrated by new iGoogle gadgets that AOL and MySpace both built to enable users to see their respective AOL or MySpace mailboxes (and other information) while on iGoogle. However, to ensure the user's privacy, this only works after the user has authorized AOL or MySpace to make their data available to the gadget running on iGoogle.  We also previously <a href="http://googledataapis.blogspot.com/2008/10/whats-that-google-data-gadgets.html" id="w6.8" title="announced">announced</a> that third-party developers can build their own iGoogle gadgets that access the OAuth-enabled APIs for Google applications such as Calendar, Picasa, and Docs. In fact, since both the gadget platform and OAuth technology are open standards, we are working to help other companies who run services similar to iGoogle to enhance them with support for these standards. Once that is in place, these new OAuth-powered gadgets that are available on iGoogle will also work on those other sites, including many of the gadgets that Google offers for its own applications. This provides a platform for some interesting mash-ups.  For example, a third-party developer could create a single gadget that uses OAuth to access both Google OAuth-enabled APIs (such as a Gmail user's <a href="http://code.google.com/apis/contacts/" id="v05v" title="address book">address book</a>) and <a href="http://developer.myspace.com/community/myspace/dataavailability.aspx" id="lewp" title="MySpace OAuth enabled APIs">MySpace OAuth-enabled APIs</a> (such as a user's friend list) and display a mashup of the combination.  </div>  <div id="d23k" style="margin-top: 0px; margin-bottom: 0px;"><br /></div>  <div id="ivuk" style="margin-top: 0px; margin-bottom: 0px;"> While the combination of OAuth with gadgets is an exciting new use of the technology, most of the use of OAuth is between websites, such as to enable a user of Google Health to allow a clinical trial matching site to access his or her health profile.  I previously mentioned that one privacy control provided by OAuth is that it defines a standard way for users to authorize one website to make their data accessible to another website. In addition, OAuth provides a way to do this without the first site needing to reveal the identity of the user -- it simply provides a different opaque security token to each additional website the user wants to share his or her data with.  It would allow a mutual fund, for example, to provide an iGoogle gadget to their customers that would run on iGoogle and show the user the value of his or her mutual fund, but without giving Google any unique information about the user, such as a social security number or account number.  In the future, maybe we will even see industries like banks use standards such as OAuth to allow their customers to authorize utility companies to perform direct debit from the user's bank account without that person having to actually share his or her bank account number with the utility vendor. </div>  <div id="pvsw" style="margin-top: 0px; margin-bottom: 0px;"><br /></div>  <div id="odub" style="margin-top: 0px; margin-bottom: 0px;"> The OAuth community is continuing to enhance this standard and is very interested in having more companies engaged with its development. The <a href="http://oauth.net/" id="q6e4" title="OAuth">OAuth.net</a> website has more details about the current standard, and I maintain a <a href="http://sites.google.com/site/oauthgoog/" id="uw8z" title="website">website</a> with advanced information about Google's use of OAuth, including work on integrating OAuth with desktop apps, and integrating with federation standards such as OpenID and SAML.  If you're interested in engaging with the OAuth community, please get in touch with us. </div><div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-3412298504869715183?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/oauth-for-secure-mashups/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Malware? We don&#8217;t need no stinking malware!</title>
		<link>https://googledata.org/google-online-security/malware-we-dont-need-no-stinking-malware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=malware-we-dont-need-no-stinking-malware</link>
		<comments>https://googledata.org/google-online-security/malware-we-dont-need-no-stinking-malware/#comments</comments>
		<pubDate>Fri, 24 Oct 2008 21:25:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Written by Oliver Fisher"This site may harm your computer"You may have seen those words in Google search results — but what do they mean? If you click the search result link you get another warning page instead of the website you were expecting. But ...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Written by Oliver Fisher</span><br /><br /><span style="font-weight: bold;">"This site may harm your computer"</span><br />You may have seen those words in Google search results — but what do they mean? If you click the search result link you get another warning page instead of the website you were expecting. But if the web page was your grandmother's baking blog, you're still confused. Surely your grandmother hasn't been secretly honing her l33t computer hacking skills at night school. Google must have made a mistake and your grandmother's web page is just fine...<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_LMSk7hTEaIE/SQI_1LfaQYI/AAAAAAAAtcc/zI4emYNyj4g/s1600-h/example.png"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 125px;" src="http://3.bp.blogspot.com/_LMSk7hTEaIE/SQI_1LfaQYI/AAAAAAAAtcc/zI4emYNyj4g/s320/example.png" alt="" id="BLOGGER_PHOTO_ID_5260837497572311426" border="0" /></a><br /><br />I work with the team that helps put the warning in Google's search results, so let me try to explain. The good news is that your grandmother is still kind and <a href="http://fitz.blogspot.com/2008/10/everybody-should-have-one.html">loves turtles</a>. She isn't trying to start a botnet or steal credit card numbers. The bad news is that her website or the server that it runs on probably has a security vulnerability, most likely from some out-of-date software. That vulnerability has been exploited and malicious code has been added to your grandmother's website. It's most likely an invisible script or iframe that pulls content from another website that tries to attack any computer that views the page. If the attack succeeds, then viruses, spyware, key loggers, botnets, and other nasty stuff will get installed.<br /><br />If you see the warning on a site in Google's search results, it's a good idea to pay attention to it. Google has automatic scanners that are constantly looking for these sorts of web pages. I help build the scanners and continue to be surprised by how accurate they are. There is almost certainly something wrong with the website even if it is run by someone you trust. The automatic scanners make unbiased decisions based on the malicious content of the pages, not the reputation of the webmaster.<br /><br />Servers are just like your home computer and need constant updating. There are lots of tools that make building a website easy, but each one adds some risk of being exploited. Even if you're diligent and keep all your website components updated, your web host may not be. They control your website's server and may not have installed the most recent OS patches. And it's not just innocent grandmothers that this happens to. There have been warnings on the websites of banks, sports teams, and corporate and government websites.<br /><br /><span style="font-weight: bold;">Uh-oh... I need help!</span><br />Now that we understand what the malware label means in search results, what do you do if you're a webmaster and Google's scanners have found malware on your site?<br /><br />There are some resources to help clean things up. The Google Webmaster Central blog has <a href="http://googlewebmastercentral.blogspot.com/2008/04/my-sites-been-hacked-now-what.html">some tips</a> and a <a href="http://googlewebmastercentral.blogspot.com/2007/09/quick-security-checklist-for-webmasters.html">quick security checklist for webmasters</a>. <a href="http://stopbadware.org/">Stopbadware.org</a> has great information, and their <a href="http://groups.google.com/group/stopbadware">forums</a> have a number of helpful and knowledgeable volunteers who may be able to help (sometimes I'm one of them). You can also use the Google SafeBrowsing diagnostics page for your site (http://www.google.com/safebrowsing/diagnostic?site=<i>&lt;site-name-here&gt;</i>) to see specific information about what Google's automatic scanners have found. If your site has been flagged, Google's <a href="http://www.google.com/webmasters/tools/">Webmaster Tools</a> lists some of the URLs that were scanned and found to be infected.<br /><br />Once you've cleaned up your website, use Google's <a href="http://www.google.com/webmasters/tools/">Webmaster Tools</a> to <a href="http://googlewebmastercentral.blogspot.com/2008/08/hey-google-i-no-longer-have-badware.html">request a malware review</a>. The automatic systems will rescan your website and the warning will be removed if the malware is gone.<br /><br /><span style="font-weight: bold;">Advance warning</span><br />I often hear webmasters asking Google for advance warning before a malware label is put on their website. When the label is applied, Google usually <a href="http://www.google.com/support/webmasters/bin/answer.py?answer=45432#2">emails the website owners</a> and then posts a warning in Google's <a href="http://www.google.com/webmasters/tools/">Webmaster Tools</a>. But no warning is given ahead of time - <span style="font-weight: bold;">before</span> the label is applied - so a webmaster can't quickly clean up the site before a warning is applied.<br /><br />But, look at the situation from the user's point of view. As a user, I'd be pretty annoyed if Google sent me to a site it knew was dangerous. Even a short delay would expose some users to that risk, and it doesn't seem justified. I know it's frustrating for a webmaster to see a malware label on their website. But, ultimately, protecting users against malware makes the internet a safer place and everyone benefits, both webmasters and users.<br /><br />Google's <a href="http://www.google.com/webmasters/tools/">Webmaster Tools</a> has started a test to provide <a href="http://googlewebmastercentral.blogspot.com/2008/10/message-center-warnings-for-hackable.html">warnings to webmasters</a> that their server software may be vulnerable. Responding to that warning and updating server software can prevent your website from being compromised with malware. The best way to avoid a malware label is to never have any malware on the site!<br /><br /><span style="font-weight: bold;">Reviews</span><br />You can request a review via Google's <a href="http://www.google.com/webmasters/tools/">Webmaster Tools</a> and you can see the status of the review there. If you think the review is taking too long, make sure to check the status. Finding all the malware on a site is difficult and the automated scanners are far more accurate than humans. The scanners may have found something you've missed and the review may have failed.  If your site has a malware label, Google's <a href="http://www.google.com/webmasters/tools/">Webmaster Tools</a> will also list some sample URLs that have problems. This is not a full list of all of the problem URLs (because that's often very, very long), but it should get you started.<br /><br />Finally, don't confuse a malware review with a <a href="http://googlewebmastercentral.blogspot.com/2008/07/requesting-reconsideration-using-google.html">request for reconsideration</a>. If Google's automated scanners find malware on your website, the site will usually not be removed from search results. There is also a different process that removes spammy websites from Google search results. If that's happened and you disagree with Google, you should submit a <a href="http://googlewebmastercentral.blogspot.com/2008/07/requesting-reconsideration-using-google.html">reconsideration request</a>. But if your site has a malware label, a reconsideration request won't do any good — for malware you need to file a malware review from the Overview page.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_LMSk7hTEaIE/SQJAJQN-pYI/AAAAAAAAtck/DOkV2_QwJdQ/s1600-h/example2.png"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 202px;" src="http://4.bp.blogspot.com/_LMSk7hTEaIE/SQJAJQN-pYI/AAAAAAAAtck/DOkV2_QwJdQ/s320/example2.png" alt="" id="BLOGGER_PHOTO_ID_5260837842438759810" border="0" /></a><br /><br /><span style="font-weight: bold;">How long will a review take?</span><br />Webmasters are eager to have a Google malware label removed from their site and often ask how long a review of the site will take. Both the original scanning and the review process are fully automated. The systems analyze large portions of the internet, which is big place, so the review may not happen immediately. Ideally, the label will be removed within a few hours. At its longest, the process should take a day or so.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-5499970354086765572?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/malware-we-dont-need-no-stinking-malware/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>New spam and virus trends from Enterprise</title>
		<link>https://googledata.org/google-online-security/new-spam-and-virus-trends-from-enterprise/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=new-spam-and-virus-trends-from-enterprise</link>
		<comments>https://googledata.org/google-online-security/new-spam-and-virus-trends-from-enterprise/#comments</comments>
		<pubDate>Tue, 12 Aug 2008 21:01:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Written by Amanda Kleha, Google Apps Security &#38; Compliance teamThe Google Apps Security &#38; Compliance team, which provides email and web security for more than 40,000 companies, regularly tracks trends in spam, viruses, and other threats. Check ...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Written by Amanda Kleha, Google Apps Security &amp; Compliance team<br /></span><br /><br />The <a href="http://www.google.com/a/help/intl/en/security/index.html">Google Apps Security &amp; Compliance</a> team, which provides email and web security for more than 40,000 companies, regularly tracks trends in spam, viruses, and other threats. Check out some of our latest findings over on the <a href="http://googleenterprise.blogspot.com/2008/08/security-spotlight-july-virus-attacks.html">Enterprise blog</a>. Also, on Friday, August 15, at 10:00 am PT, we'll be hosting a <a href="http://w.on24.com/r.htm?e=116483&amp;k=E679E434ECD09EFE9AB299E6B4E16A3B&amp;partnerref=blog_security">webinar</a> on keeping your business safe from web and email threats -- tune in if you'd like to learn more.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-8589879725675215836?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/new-spam-and-virus-trends-from-enterprise/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Keyczar: Safe and Simple Cryptography</title>
		<link>https://googledata.org/google-online-security/keyczar-safe-and-simple-cryptography/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=keyczar-safe-and-simple-cryptography</link>
		<comments>https://googledata.org/google-online-security/keyczar-safe-and-simple-cryptography/#comments</comments>
		<pubDate>Mon, 11 Aug 2008 18:06:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Written by Steve WeisCryptography is notoriously hard to get right and if improperly used, can create serious security holes. Common mistakes include using the wrong cipher modes or obsolete algorithms, composing primitives in an unsafe manner, hard-co...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Written by Steve Weis</span><br /><br /><img style="margin: 0pt 0pt 10px 10px; float: right;" src="http://2.bp.blogspot.com/_LMSk7hTEaIE/SKCABPuzeVI/AAAAAAAAhXc/nyKwkCyDdwQ/s200/keyczar_logo.jpg" alt="" id="BLOGGER_PHOTO_ID_5233323525895584082" border="0" />Cryptography is notoriously hard to get right and if improperly used, can create serious security holes. Common mistakes include using the wrong cipher modes or obsolete algorithms, composing primitives in an unsafe manner, hard-coding keys in source code, or failing to anticipate the need for future key rotation. With these risks in mind, we're pleased to announce the open-source release of <a href="http://www.keyczar.org/">Keyczar</a>.<br /><br />Keyczar is a cryptographic toolkit that supports encryption and authentication for both symmetric and public-key algorithms. It addresses some of the aforementioned issues by choosing safe defaults, tagging outputs with key version information, and providing a simple application programming interface. Keyczar's key versioning system makes it easy to rotate and revoke keys, without worrying about backward compatibility or making any changes to source code.<br /><br />We look forward to working with the open source community and continuing to make cryptography safer and easier to use. To download Keyczar or for more information, please visit our <a href="http://code.google.com/p/keyczar">Google Code project</a> and <a href="http://groups.google.com/group/keyczar-discuss">discussion group</a>.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-3184501384980108539?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/keyczar-safe-and-simple-cryptography/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Are you using the latest web browser?</title>
		<link>https://googledata.org/google-online-security/are-you-using-the-latest-web-browser/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=are-you-using-the-latest-web-browser</link>
		<comments>https://googledata.org/google-online-security/are-you-using-the-latest-web-browser/#comments</comments>
		<pubDate>Wed, 16 Jul 2008 20:24:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Written by Thomas DuebendorferIn view of mass defacements of hundreds of thousand of web pages - with the intent to misuse them to launch drive-by download attacks - security researchers from ETH Zurich, Google, and IBM Internet Security Systems were i...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Written by Thomas Duebendorfer</span><br /><br />In view of mass defacements of hundreds of thousand of web pages - with the intent to misuse them to launch drive-by download attacks - security researchers from ETH Zurich, Google, and IBM Internet Security Systems were interested in looking at the other side of the attack: the web browser. By analyzing the web browser versions seen in visits to Google websites, they have shown that more than 600 million Internet users don't use the latest version of their browser.<br /><br /><b>Slow migration to latest browser version</b><br />The researchers' paper, entitled <a href="http://www.techzoom.net/insecurity-iceberg">"Understanding the Web Browser Threat"</a>, shows that as of June 2008, only 59.1% percent of Internet users worldwide use the latest major version of their preferred web browser. Firefox users are the most attentive: 92.2% of them surfed with Firefox 2, the latest major version before the recently released 3.0. Only 52.5% of Microsoft Internet Explorer users have updated to version 7, which is the most secure according to multiple publicly-cited Microsoft experts (among them Sandi Hardmeier). The study revealed that 637 million Internet users worldwide who use web browsers are either not running the latest version of their preferred browser or have not installed the latest patches. These users are vulnerable to exploitation due to their web browser's "built-in" vulnerabilities and the lack of more recent security mechanisms such as improved phishing protection.<br /><br /><b>Neglected security patches</b><br />Over the past 18 months, the study also shows, a maximum of 83.3% of Firefox users were using the latest major version of the web browser and also had all current patches installed (i.e. latest minor version). Only 56.1% and 47.6% of Opera and Internet Explorer users, respectively, were similarly utilizing fully-patched web browsers. Apple users are no better: since the public release of Safari 3, only 65.3% of users operate the latest Safari version.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp1.blogger.com/_LMSk7hTEaIE/SH5ZvdukCtI/AAAAAAAAd10/-yGf2De4l8I/s1600-h/share.png"><img style="cursor: pointer;" src="http://bp1.blogger.com/_LMSk7hTEaIE/SH5ZvdukCtI/AAAAAAAAd10/-yGf2De4l8I/s400/share.png" alt="" id="BLOGGER_PHOTO_ID_5223711289765006034" border="0" /></a><br /><div><em>Maximum measured share of users surfing the web with the most secure versions of Firefox, Safari, Opera and Internet Explorer in June 2008 as seen on Google websites.</em></div><br /><br /><b>Obsolete browser warning</b><br />The study's most important finding is that technical measures now in place do not sufficiently guarantee browser security, and that users' security awareness must be further developed. The problem is that most users are unaware that they are not using their browser's latest version. It must be made clear to web browser users that outdated software is associated with significantly higher risk. The researchers therefore suggest that, as a critical component of web software, a visible warning be instituted that warns the user of missing security patches in a way analogous to the 'best before' date in the perishable food industry. Software updates must also be made easier to find. The resulting transparency would go far in contributing to end user awareness of software weaknesses, and allow users to better evaluate risks.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp0.blogger.com/_LMSk7hTEaIE/SH5aAEVMy0I/AAAAAAAAd18/nXMAqQdWXno/s1600-h/expired.png"><img style="cursor: pointer;" src="http://bp0.blogger.com/_LMSk7hTEaIE/SH5aAEVMy0I/AAAAAAAAd18/nXMAqQdWXno/s400/expired.png" alt="" id="BLOGGER_PHOTO_ID_5223711575005514562" border="0" /></a><br /><div><em>Example "best before" implementation on a Web browser</em></div><br /><br />As a side effect, having users migrate faster to the latest browser version would not only increase security but also make the lives of webmasters easier, as they would need to test and optimize websites for fewer older versions of web browsers.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-5523715890775360696?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/are-you-using-the-latest-web-browser/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>All Your iFrame Are Point to Us</title>
		<link>https://googledata.org/google-online-security/all-your-iframe-are-point-to-us/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=all-your-iframe-are-point-to-us</link>
		<comments>https://googledata.org/google-online-security/all-your-iframe-are-point-to-us/#comments</comments>
		<pubDate>Mon, 11 Feb 2008 21:57:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Written by Niels Provos, Anti-Malware TeamIt has been over a year and a half since we started to identify web pages that infect vulnerable hosts via drive-by downloads, i.e. web pages that attempt to exploit their visitors by installing and running mal...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Written by Niels Provos, Anti-Malware Team</span><br /><br />It has been over a year and a half since we started to identify web pages that infect vulnerable hosts via <i>drive-by downloads</i>, i.e. web pages that attempt to exploit their visitors by installing and running malware automatically.  During that time we have investigated billions of URLs and found more than three million unique URLs on over 180,000 web sites automatically installing malware.  During the course of our research, we have investigated not only the prevalence of drive-by downloads but also how users are being exposed to malware and how it is being distributed.   Our research paper is currently under peer review, but we are making a <a href="http://research.google.com/archive/provos-2008a.pdf">technical report [PDF]</a> available now.  Although our technical report contains a lot more detail, we present some high-level findings here:<br /><br /><span style="font-weight: bold;">Search Results Containing a URL Labeled as Harmful</span><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp3.blogger.com/_LMSk7hTEaIE/R7DFFTZgEGI/AAAAAAAAGk0/eNxgOyjY3x4/s1600-h/harmful_search_result_pages.png"><img style="cursor: pointer;" src="http://bp3.blogger.com/_LMSk7hTEaIE/R7DFFTZgEGI/AAAAAAAAGk0/eNxgOyjY3x4/s400/harmful_search_result_pages.png" alt="" id="BLOGGER_PHOTO_ID_5165845467491209314" border="0" /></a><br /><br />The above graph shows the percentage of daily queries that contain at least one search result labeled as harmful.  In the past few months, more than 1% of all search results contained at least one result that we believe to point to malicious content and the trend seems to be increasing.<br /><br /><b>Browsing Habits</b><br /><br />Good computer hygiene, such as running automatic updates for the operating system and third-party applications, as well as installing anti-virus products goes a long way in protecting your home computer.  However, we have been wondering if  users' browsing habits impact the likelihood of encountering malicious web pages.   To study this aspect, we took a sample of ~7 million URLs and mapped them to <a title="DMOZ" href="http://www.dmoz.org/">DMOZ</a> categories.  Although we found that adult web pages may increase the risk of exploitation, each DMOZ category was affected.<br /><br /><b>Malicious Content Injection</b><br /><br />To understand if malicious content on a web server is due to poor web server security, we analyzed the version numbers reported by web servers on which we found malicious pages. Specifically, we looked at the Apache and the PHP versions exported as part of a server's response.   We found that over 38% of both Apache and PHP versions were outdated increasing the risk of remote content injection to these servers.<br /><br />Our "<a href="http://www.usenix.org/event/hotbots07/tech/full_papers/provos/provos.pdf">Ghost In the Browser [PDF]</a>" paper highlighted third-party content as one potential vector of malicious content.  Today, a lot of third-party content is due to advertising.  To assess the extent to which advertising contributes to drive-by downloads, we analyze the distribution chain of malware, i.e. all the intermediary URLs a browser downloads before reaching a malware payload.  We inspected each distribution chain for membership in about 2,000 known advertising networks.  If any URL in the distribution chain corresponds to a known advertising network, we count the whole page as being infectious due to Ads.  In our analysis, we found that on average 2% of malicious web sites were delivering malware via advertising.  The underlying problem is that advertising space is often syndicated to other parties who are not known to the web site owner.  Although non-syndicated advertising networks such as Google Adwords are not affected, any advertising networks practicing syndication needs to carefully study this problem. Our <a href="http://research.google.com/archive/provos-2008a.pdf">technical report [PDF]</a> contains more detail including an analysis based on the popularity of web sites.<br /><b><br />Structural Properties of Malware Distribution</b><br /><br />Finally, we also investigated the structural properties of malware distribution sites.  Some malware distribution sites had as many as 21,000 regular web sites pointing to them.  We also found that the majority of malware was hosted on web servers located in China.  Interestingly, Chinese malware distribution sites are mostly pointed to by Chinese web servers.<br /><br />We hope that an analysis such as this will help us to better understand the malware problem in the future and allow us to protect users all over the Internet from malicious web sites as best as we can.  One thing is clear - we have a lot of work ahead of us.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-8430044300368359501?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/all-your-iframe-are-point-to-us/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
<enclosure url="" length="" type="" />
		</item>
		<item>
		<title>Auditing open source software</title>
		<link>https://googledata.org/google-online-security/auditing-open-source-software/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=auditing-open-source-software</link>
		<comments>https://googledata.org/google-online-security/auditing-open-source-software/#comments</comments>
		<pubDate>Mon, 08 Oct 2007 23:13:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Written by Chris Evans, Security TeamGoogle encourages its employees to contribute back to the open source community, and there is no exception in Google's Security Team. Let's look at some interesting open source vulnerabilities that were located and ...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Written by Chris Evans, Security Team</span><br /><br />Google encourages its employees to contribute back to the open source community, and there is no exception in Google's Security Team. Let's look at some interesting open source vulnerabilities that were located and fixed by members of Google's Security team. It is interesting to classify and aggregate the code flaws leading to the vulnerabilities, to see if any particular type of flaw is more prevalent.<br /><ol><li><b>JDK</b>. In May 2007, I <a title="released details" href="http://scary.beasts.org/security/CESA-2006-004.html" id="ro-g">released details</a> on an interesting bug in the ICC profile parser in Sun's JDK. The bug is particularly interesting because it could be exploited by an evil image. Most previous JDK bugs involve a user having to run a whole evil applet. The key parts of code which demonstrate the bug are as follows:<br /><blockquote><code style="font-size: 120%"><br />TagOffset = SpGetUInt32 (&Ptr);<br />if (ProfileSize &lt TagOffset)<br />&nbsp;&nbsp;return SpStatBadProfileDir;<br />...<br />TagSize = SpGetUInt32 (&Ptr);<br />if (ProfileSize &lt TagOffset + TagSize)<br />&nbsp;&nbsp;return SpStatBadProfileDir;<br />...<br />Ptr = (KpInt32_t *) malloc ((unsigned int)numBytes+HEADER);<br /></code></blockquote><br />Both TagSize and TagOffset are untrusted unsigned 32-bit values pulled out of images being parsed. They are added together, causing a classic integer overflow condition and the bypass of the size check. A subsequent additional integer overflow in the allocation of a buffer leads to a heap-based buffer overflow. </li><br /><li><b>gunzip</b>. In September 2006, my colleague Tavis Ormandy <a title="reported some interesting vulnerabilities" href="http://www.scary.beasts.org/security/tavis_gzip.txt" id="qbd9">reported some interesting vulnerabilities</a> in the gunzip decompressor. They were triggered when an evil compressed archive is decompressed. A lot of programs will automatically pass compressed data through gunzip, making it an interesting attack. The key parts of the code which demonstrate one of the bugs are as follows:<br /><blockquote><code style="font-size: 120%"><br />ush count[17], weight[17], start[18], *p;<br />...<br />for (i = 0; i &lt (unsigned)nchar; i++) count[bitlen[i]]++;<br /></code></blockquote><br />Here, the stack-based array "count" is indexed by values in the "bitlen" array. These values are under the control of data in the incoming untrusted compressed data, and were not checked for being within the bounds of the "count" array. This led to corruption of data on the stack.</li><br /><br /><li><b>libtiff</b>. In August 2006, Tavis <a title="reported a range of security vulnerabilities" href="http://www.scary.beasts.org/security/tavis_libtiff.txt" id="lkkz">reported a range of security vulnerabilities</a> in the libtiff image parsing library. A lot of image manipulation programs and services will be using libtiff if they handle TIFF format files. So, an evil TIFF file could compromise a lot of desktops or even servers. The key parts of the code which demonstrate one of the bugs are as follows:<br /><blockquote><code style="font-size: 120%"><br />if (sp-&gt;cinfo.d.image_width != segment_width ||<br />&nbsp;&nbsp;&nbsp;&nbsp;sp-&gt;cinfo.d.image_height != segment_height) {<br />&nbsp;&nbsp;TIFFWarningExt(tif-&gt;tif_clientdata, module,<br />&nbsp;&nbsp;&nbsp;&nbsp;"Improper JPEG strip/tile size, expected %dx%d, got %dx%d",<br /></code></blockquote><br />Here, a TIFF file containing a JPEG image is being processed. In this case, both the TIFF header and the embedded JPEG image contain their own copies of the width and height of the image in pixels. This check above notices when these values differ, issues a warning, and continues. The destination buffer for the pixels is allocated based on the TIFF header values, and it is filled based on the JPEG values. This leads to a buffer overflow if a malicious image file contains a JPEG with larger dimensions than those in the TIFF header. Presumably the intent here was to support broken files where the embedded JPEG had smaller dimensions than those in the TIFF header. However, the consequences of larger dimensions that those in the TIFF header had not been considered.</li></ol><br />We can draw some interesting conclusions from these bugs. The specific vulnerabilities are integer overflows, out-of-bounds array accesses and buffer overflows. However, the general theme is using an integer from an untrusted source without adequately sanity checking it. Integer abuse issues are still very common in code, particular code which is decoding untrusted binary data or protocols. We recommend being careful using any such code until it has been vetted for security (by extensive code auditing, fuzz testing, or preferably both). It is also important to watch for security updates for any decoding software you use, and keep patching up to date.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-7395084475449002722?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/auditing-open-source-software/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Malware reviews via Webmaster Tools</title>
		<link>https://googledata.org/google-webmaster-central/malware-reviews-via-webmaster-tools/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=malware-reviews-via-webmaster-tools</link>
		<comments>https://googledata.org/google-webmaster-central/malware-reviews-via-webmaster-tools/#comments</comments>
		<pubDate>Mon, 13 Aug 2007 19:27:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Webmaster Central]]></category>
		<category><![CDATA[google webmaster tools]]></category>
		<category><![CDATA[webmaster central]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Written by Panayiotis Mavrommatis, Anti-Malware TeamIn the past year, the number of sites affected by malware/badware grew from a handful a week to thousands per week. We noted your suggestions to improve communication for webmasters of affected sites ...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Written by Panayiotis Mavrommatis, Anti-Malware Team</span><br /><br />In the past year, the number of sites affected by <a title="malware/badware" href="http://stopbadware.org/home/help">malware/badware</a> grew from a handful a week to thousands per week. We noted your suggestions to improve communication for webmasters of affected sites -- suggestions mentioned in our earlier blog post <a href="http://googlewebmastercentral.blogspot.com/2007/01/about-badware-warnings.html" title="&quot;About badware warnings&quot;">"About badware warnings"</a> as well as the <a title="stopbadware discussion group" href="http://groups.google.com/group/stopbadware">stopbadware discussion group</a>. Now, <a href="http://www.google.com/webmasters/tools" title="Webmaster Tools">Webmaster Tools</a> provides malware reviews.<br /><br />If you find that your site is affected by malware, either through <a href="http://www.google.com/support/bin/answer.py?answer=45449&amp;topic=360&amp;hl=en&amp;sa=X&amp;oi=malwarewarninglink&amp;resnum=1&amp;ct=help" title="malware-labeled search results">malware-labeled search results</a> or in the summary for your site in Webmaster Tools, we've streamlined the process to review your site and return it malware-label-free in our search results:<br /><ol><li>View a sample of the dangerous URLs on your site in Webmaster Tools.</li><li>Make any necessary changes to your site according to <a title="StopBadware.org's Security tips" href="http://stopbadware.org/home/security">StopBadware.org's Security tips</a>.</li><li>New: Request a malware review from Google and we'll evaluate your site.</li><li>New: Check the status of your review.</li><ul><li>         If we feel the site is still harmful, we'll provide an updated list of remaining dangerous URLs       </li><li> If we've determined the site to be clean, you can expect removal of malware messages in the near future (usually within 24 hours).</li></ul></ol><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_LMSk7hTEaIE/RsCxcaKO-CI/AAAAAAAAFNw/yj3LCO7E49M/s1600-h/summary.png"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;" src="http://2.bp.blogspot.com/_LMSk7hTEaIE/RsCxcaKO-CI/AAAAAAAAFNw/yj3LCO7E49M/s320/summary.png" alt="" id="BLOGGER_PHOTO_ID_5098269879800100898" border="1" /></a><br />We encourage all webmasters to become familiar with <a href="http://stopbadware.org/home/security#preventing" title="malware prevention tips">Stopbadware's malware prevention tips</a>. If you have additional questions, please review our <a href="http://www.google.com/support/webmasters/bin/answer.py?answer=45432" title="documentation">documentation</a> or post to the <a href="http://groups.google.com/group/stopbadware" title="discussion group">discussion group</a>. We hope you find this new feature in <a title="Webmaster Tools" href="http://www.google.com/webmasters/tools">Webmaster Tools</a> useful in discovering and fixing any malware-related problems, and thanks for your diligence for awareness and prevention of malware.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/32069983-4257933300900304156?l=googlewebmastercentral.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-webmaster-central/malware-reviews-via-webmaster-tools/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Automating web application security testing</title>
		<link>https://googledata.org/google-online-security/automating-web-application-security-testing/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=automating-web-application-security-testing</link>
		<comments>https://googledata.org/google-online-security/automating-web-application-security-testing/#comments</comments>
		<pubDate>Mon, 16 Jul 2007 18:40:00 +0000</pubDate>
		<dc:creator><![CDATA[Panayiotis Mavrommatis]]></dc:creator>
				<category><![CDATA[Google Online Security]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[online security]]></category>

		<guid isPermaLink="false"></guid>
		<description><![CDATA[Posted by Srinath Anantharaju, Security TeamCross-site scripting (aka XSS) is the term used to describe a class of security vulnerabilities in web applications. An attacker can inject malicious scripts to perform unauthorized actions in the context of ...]]></description>
				<content:encoded><![CDATA[<span class="byline-author">Posted by Srinath Anantharaju, Security Team</span><br /><br />Cross-site scripting (aka XSS) is the term used to describe a class of security vulnerabilities in web applications. An attacker can inject malicious scripts to perform unauthorized actions in the context of the victim's web session. Any web application that serves documents that include data from untrusted sources could be vulnerable to XSS if the untrusted data is not appropriately sanitized. A web application that is vulnerable to XSS can be exploited in two major ways:<br /><br />&nbsp;&nbsp;&nbsp; <span style="FONT-WEIGHT:bold">Stored XSS</span> - Commonly exploited in a web application where one user enters information that's viewed by another user. An attacker can inject malicious scripts that are executed in the context of the victim's session. The exploit is triggered when a victim visits the website at some point in the future, such as through improperly sanitized blog comments and guestbook entries, which facilitates stored XSS.<br /><br />&nbsp;&nbsp;&nbsp; <span style="FONT-WEIGHT:bold">Reflected XSS </span>- An application that echoes improperly sanitized user input received as query parameters is vulnerable to reflected XSS. With a vulnerable application, an attacker can craft a malicious URL and send it to the victim via email or any other mode of communication. When the victim visits the tampered link, the page is loaded along with the injected script that is executed in the context of the victim's session.<br /><br />The general principle behind preventing XSS is the proper sanitization (via, for instance, escaping or filtering) of all untrusted data that is output by a web application. If untrusted data is output within an HTML document, the appropriate sanitization depends on the specific context in which the data is inserted into the HTML document. The context could be in the regular HTML body, tag attributes, URL attributes, URL query string attributes, style attributes, inside JavaScript, HTTP response headers, etc.<br /><br />The following are some (by no means complete) examples of XSS vulnerabilities. Let's assume there is a web application that accepts user input as the 'q' parameter. Untrusted data coming from the attacker is marked in red.<br /><ul><br /><li>Injection in regular HTML body - angled brackets not filtered or escaped<br /><br /><span style="font-family:Courier New;">&lt;b&gt;Your query '<font color="#ff0000" style="FONT-FAMILY:Courier New">&lt;script&gt;evil_script()&lt;/script&gt;</font>' returned xxx results&lt;/b&gt; </span></li><br /><li>Injection inside tag attributes - double quote not filtered or escaped<br /><br /><span style="font-family:Courier New;">&lt;form ...<br />&nbsp;&nbsp;&lt;input name="q" value="<font color="#ff0000">blah"&gt;&lt;script&gt;evil_script()&lt;/script&gt;</font>"&gt;<br />&lt;/form&gt;</span></li><br /><li>Injection inside URL attributes - non-http(s) URL<br /><br /><span style="font-family:Courier New;">&lt;img src="<font color="#ff0000">javascript:evil_script()</font>"&gt;...&lt;/img&gt;</span></li><br /><li>In JavaScript context - single quote not filtered or escaped<br /><br /><span style="font-family:Courier New;">&lt;script&gt;<br />&nbsp;&nbsp;var msg = '<font color="#ff0000">blah'; evil_script(); //<font color="#000000">'</font></font>;<br />&nbsp;&nbsp;// do something with msg variable<br />&lt;/script&gt;</span></li></ul><br /><br />In the cases where XSS arises from meta characters being inserted from untrusted sources into an HTML document, the issue can be avoided either by filtering/disallowing the meta characters, or by escaping them appropriately for the given HTML context. For example, the HTML meta characters &lt;, &gt;, &amp;, " and ' must be replaced with their corresponding HTML entity references &amp;lt;, &amp;gt;, &amp;amp;, &amp;quot; and &amp;#39 respectively. In a JavaScript-literal context, inserting a backslash in front of \, ', " and converting the carriage returns, line-feeds and tabs into \r, \n and \t respectively should avoid untrusted meta characters being interpreted as code.<br /><br />How about an automated tool for finding XSS problems in web applications? Our security team has been developing a black box fuzzing tool called Lemon (deriving from the commonly-recognized name for a defective product). Fuzz testing (also referred to as fault-injection testing) is an automated testing approach based on supplying inputs that are designed to trigger and expose flaws in the application. Our vulnerability testing tool enumerates a web application's URLs and corresponding input parameters. It then iteratively supplies fault strings designed to expose XSS and other vulnerabilities to each input, and analyzes the resulting responses for evidence of such vulnerabilities. Although it started out as an experimental tool, it has proved to be quite effective in finding XSS problems. Besides XSS, it finds other security problems such as response splitting attacks, cookie poisoning problems, stacktrace leaks, encoding issues and charset bugs. Since the tool is homegrown it is easy to integrate into our automated test environment and to extend based on specific needs. We are constantly in the process of adding new attack vectors to improve the tool against known security problems.<br /><br /><span style="font-weight:bold;">Update:</span><br />I wanted to respond to a few questions that seem to be common among readers.  I've listed them below.  Thanks for the feedback.  Please keep the questions and comments coming.<br /><br />Q. Does Google plan to market it at some point?<br />A. Lemon is highly customized for Google apps and we have no plans of releasing it in near future.<br /><br />Q. Did Google's security team check out any commercially available fuzzers? Is the ability to keep improving the fuzzer the main draw of a homegrown tool?<br />A. We did evaluate commercially available fuzzers but felt that our specialized needs could be served best by developing our own tools.<div class="blogger-post-footer"><img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/1176949257541686127-7122652028700946539?l=googleonlinesecurity.blogspot.com' alt='' /></div>]]></content:encoded>
			<wfw:commentRss>https://googledata.org/google-online-security/automating-web-application-security-testing/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
