Seeing is (Not) Believing: The Mirage Card Attack Targeting Online Social Networks
In the digital era, Online Social Networks~(OSNs) play a crucial role in disseminating information, with sharing cards for link previews serving as a key feature. These cards provide snapshots of shared content, including titles, descriptions, and images. However, the security implications of these cards remain largely overlooked. This paper introduces the \textit{Mirage Card Attack}, a novel class of attacks that exploits vulnerabilities in sharing card mechanisms across major OSNs. We identify two primary attack vectors: \textit{Proxy-Based Redirection} and \textit{User-Agent-Based Cloaking}. These attacks leverage design flaws in Share-SDK implementations and HTML meta tag usage, allowing attackers to bypass existing security measures and present deceptive content to users. Our systematic analysis reveals critical vulnerabilities in current sharing card systems. We demonstrate the feasibility of these attacks through comprehensive evaluations across 8 major OSNs for \textit{User-Agent-Based Cloaking} and 6 OSNs for \textit{Proxy-Based Redirection}. Additionally, we analyze 8 widely used card generation tools, uncovering significant security gaps. Our experiments show that some forged cards persist for over 15 days, highlighting the inadequacy of existing detection methods. To evaluate the practical impact of Mirage Card Attacks, we conduct a user study to assess their ability to deceive users. The results indicate that only 18% of the participants successfully identify forged cards, demonstrating the high effectiveness of the attack. Furthermore, exposure to forged cards significantly erodes user trust in OSNs, with 38% of participants reporting a reduced likelihood of engaging with shared content in the future. This work exposes the high feasibility and potentially severe consequences of Mirage Card Attacks while providing crucial insights for enhancing OSN security.
Sat 21 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
14:00 - 15:30 | Session8: Software Vulnerability and Security IIIResearch Track / New Idea Track / Tool Demonstration Track at Cosmos 3C Chair(s): Lingfeng Bao Zhejiang University | ||
14:00 15mTalk | VDLS: A Vulnerability Detection Approach Based on Execution Path Selection Research Track Xuanyan Zhu Nanjing University of Aeronautics and Astronautics, Jingxuan Zhang Nanjing University of Aeronautics and Astronautics, Yixuan Tang Nanjing University of Aeronautics and Astronautics, Weiqin Zou Nanjing University of Aeronautics and Astronautics, Jiayi Li Nanjing University of Aeronautics and Astronautics, Han Luo Nanjing University of Aeronautics and Astronautics, Jiaqi Liu National Key Laborarory on Test Physics & Numerical Mathematics | ||
14:15 15mTalk | Exploring Typo Squatting Threats in the Hugging Face Ecosystem Research Track Ningyuan Li Beijing University of Technology, Yanjie Zhao Huazhong University of Science and Technology, Shenao Wang Huazhong University of Science and Technology, Zehao Wu Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology | ||
14:30 15mTalk | Unraveling the Characterization and Propagation of Security Vulnerabilities in TensorFlow-based Deep Learning Software Supply Chain Research Track Yiren Zhou Nanjing University of Aeronautics and Astronautics, Lina Gong Nanjing University of Aeronautics and Astronautic, Tiantian Ma Nanjing University of Aeronautics and Astronautics File Attached | ||
14:45 15mTalk | Seeing is (Not) Believing: The Mirage Card Attack Targeting Online Social Networks Research Track Wangchenlu Huang Beijing university of posts and telecommunications, Shenao Wang Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Tianxiang Wang China United Network Communications Group Corporation Limited, Yuhao Gao China United Network Communications Group Corporation Limited, Guosheng Xu Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology | ||
15:00 10mTalk | ETrace : Event-Driven Vulnerability Detection in Smart Contracts via LLM-Based Trace Analysis New Idea Track Chenyang Peng Xi'an Jiaotong University, Haijun Wang Xi'an Jiaotong University, Yin Wu Xi'an Jiaotong University, Hao Wu Xi'an JiaoTong University, Ming Fan Xi'an Jiaotong University, Yitao Zhao Yunnan Power Grid Co., Ltd, Ting Liu Xi'an Jiaotong University Pre-print | ||
15:10 10mTalk | A Natural Language Guided Adaptive Model-based Testing Tool for Autonomous Driving Tool Demonstration Track | ||
15:20 10mTalk | Software Reuse in the Generative AI Era: From Cargo Cult Towards Systematic PracticesBest New Idea Paper Award New Idea Track | ||
Cosmos 3C is the third room in the Cosmos 3 wing.
When facing the main Cosmos Hall, access to the Cosmos 3 wing is on the left, close to the stairs. The area is accessed through a large door with the number “3”, which will stay open during the event.