Local Frames: Exploiting Inherited Origins to Bypass Content Blockers

📅 2025-05-31
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This study identifies systematic privacy protection failures in mainstream web privacy tools (e.g., uBlock Origin, Privacy Badger) when handling local frames—particularly `about:blank` iframes—enabling fingerprinting, cookie theft, and data exfiltration attacks that evade detection. Method: We conduct a multi-faceted empirical analysis including large-scale web security measurement, iframe origin semantics analysis, black-box functional testing, filter rule efficacy evaluation, and cross-tool vulnerability validation. Contribution/Results: We are the first to systematically characterize the anomalous interaction between local frames and browser privacy boundaries. We distill 19 cross-tool vulnerability patterns rooted in the incompatibility between legacy web features (e.g., relaxed same-origin policy for `about:blank`) and modern privacy models. All six evaluated tools exhibit at least one exploitable flaw. Measurement across the top 10K websites reveals that 56% employ local frames, and among them, 14.3% host malicious requests that bypass intended filtering—demonstrating widespread real-world impact.

Technology Category

Application Category

📝 Abstract
We present a study of how local frames (i.e., iframes with non-URL sources like"about:blank") are mishandled by a wide range of popular Web security and privacy tools. As a result, users of these tools remain vulnerable to the very attack techniques they seek to protect against, including browser fingerprinting, cookie-based tracking, and data exfiltration. The tools we study are vulnerable in different ways, but all share a root cause: legacy Web functionality interacting with browser privacy boundaries in unexpected ways, leading to systemic vulnerabilities in tools developed, maintained, and recommended by privacy experts and activists. We consider four core capabilities supported by most privacy tools and develop tests to determine whether each can be evaded through the use of local frames. We apply our tests to six popular Web privacy and security tools, identifying at least one vulnerability in each for a total of 19, and extract common patterns regarding their mishandling of local frames. Our measurement of popular websites finds that 56% employ local frames and that 73.7% of the requests made by these local frames should be blocked by popular filter lists but instead trigger the vulnerabilities we identify; from another perspective, 14.3% of all sites that we crawl make requests that should be blocked inside of local frames. We disclosed the vulnerabilities to the tool authors and discuss both our experiences working with them to patch their products and the implications of our findings for other privacy and security research.
Problem

Research questions and friction points this paper is trying to address.

Study how local frames bypass Web security tools
Identify vulnerabilities in privacy tools against attacks
Measure widespread misuse of local frames online
Innovation

Methods, ideas, or system contributions that make the work stand out.

Exploiting local frames to bypass blockers
Testing privacy tools for local frame vulnerabilities
Identifying systemic flaws in Web security tools
🔎 Similar Papers
No similar papers found.
Alisha Ukani
Alisha Ukani
PhD Student, UC San Diego
securityprivacyInternet measurement
H
Hamed Haddadi
Imperial College London & Brave Software Inc, London, UK
A
A. Snoeren
UC San Diego, San Diego, USA
Peter Snyder
Peter Snyder
Brave Software