PUPPETNETS: DESIGN AND ANALYSIS
We attempt to map out the attackers’ opportunity space for misusing Web
browsers. In lieu of the necessary formal tools for analyzing potential vulnerabilities,
neither the types of attacks nor their specific realizations are exhaustive
enough to provide us with a solid worst-case scenario. Nevertheless,
we have tried to enhance the attacks as much as possible, in an attempt to
approximately determine in what ways and to what effect the attacker could
capitalize on the underlying vulnerabilities. In the rest of this section, we explore
in more detail a number of ways of using puppetnets, and attempt to
quantify their effectiveness.