Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

DETECTION AND PREVENTION OF ACCESSIBILITY CLOAKING ATTACKS

View through CrossRef
Digital environments enable greater integration of people with disabilities into economic and social life, supported by legislative accessibility requirements. However, this progress creates new cybersecurity vulnerabilities, particularly for assistive technology users. Objective. The objective of our study was to identify and analyze potential attack vectors associated with the unethical use of accessibility technologies and to develop methods for their detection and prevention, with specific focus on accessibility cloaking techniques. Methods. We conducted an analysis of popular assistive browser extensions and their detection methods, implemented proof-of-concept accessibility cloaking techniques using HTML and CSS, and evaluated the effectiveness of current automated testing tools in detecting these manipulations. Based on identified vulnerabilities, we developed a CLI application using AXE-Core for automated detection of accessibility cloaking markers. Results. Our analysis revealed multiple HTML/CSS-based techniques that create different experiences for users with and without assistive technologies, enabling malicious content to be hidden from regular users. While these techniques violate multiple WCAG success criteria, current automated testing tools (Wave, Axe, Lighthouse) largely failed to detect such manipulations. Our proof-of-concept detection tool, based on an agent architecture approach, successfully identified these accessibility cloaking techniques. Conclusion. Ensuring web resource accessibility without compromising security requires a comprehensive approach including regular security audits, additional verification of content displaying differently for different user groups, developer training, and automated detection tools. Our findings emphasize that accessibility’s purpose is to make content equally accessible to all users, not to create separate or hidden experiences that can be exploited for malicious purposes.
Title: DETECTION AND PREVENTION OF ACCESSIBILITY CLOAKING ATTACKS
Description:
Digital environments enable greater integration of people with disabilities into economic and social life, supported by legislative accessibility requirements.
However, this progress creates new cybersecurity vulnerabilities, particularly for assistive technology users.
Objective.
The objective of our study was to identify and analyze potential attack vectors associated with the unethical use of accessibility technologies and to develop methods for their detection and prevention, with specific focus on accessibility cloaking techniques.
Methods.
We conducted an analysis of popular assistive browser extensions and their detection methods, implemented proof-of-concept accessibility cloaking techniques using HTML and CSS, and evaluated the effectiveness of current automated testing tools in detecting these manipulations.
Based on identified vulnerabilities, we developed a CLI application using AXE-Core for automated detection of accessibility cloaking markers.
Results.
Our analysis revealed multiple HTML/CSS-based techniques that create different experiences for users with and without assistive technologies, enabling malicious content to be hidden from regular users.
While these techniques violate multiple WCAG success criteria, current automated testing tools (Wave, Axe, Lighthouse) largely failed to detect such manipulations.
Our proof-of-concept detection tool, based on an agent architecture approach, successfully identified these accessibility cloaking techniques.
Conclusion.
Ensuring web resource accessibility without compromising security requires a comprehensive approach including regular security audits, additional verification of content displaying differently for different user groups, developer training, and automated detection tools.
Our findings emphasize that accessibility’s purpose is to make content equally accessible to all users, not to create separate or hidden experiences that can be exploited for malicious purposes.

Related Results

Transducer cloaking for Kim Benjamin
Transducer cloaking for Kim Benjamin
There is an effort to develop metamaterials for cloaking objects in a way that eliminates backscattering and fills in the shadow zone. The development of this cloaking material for...
A Security Analysis of Anti-Audio Cloaking Schemes
A Security Analysis of Anti-Audio Cloaking Schemes
Audio cloaking aims to protect audio artifacts from unauthorized cloning by speech synthesizers and to safeguard user identity by altering signals to make them unusable for voice s...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures
Recommender systems have become an integral part of online services due to their ability to help users locate specific information in a sea of data. However, existing studies show ...
Misbehaviour detection and trustworthy collaboration in vehicular communication networks
Misbehaviour detection and trustworthy collaboration in vehicular communication networks
(English) The integration of advanced wireless technologies, e.g., cellular and IEEE 802.11p, in modern vehicles enables vehicle-to-everything (V2X) communication, fostering the ne...
How to better tackle Elder Abuse in Belgium?
How to better tackle Elder Abuse in Belgium?
SCIENTIFIC REPORT 30 -- CHAPTER 1: INTRODUCTION 30 -- 1 CONTEXT AND PROBLEM DESCRIPTION 30 -- 2 SCOPE, OBJECTIVES AND RESEARCH QUESTIONS 32 -- 3 METHODOLOGY 33 -- 4 DEFINITIONS 33 ...
LIMITATIONS OF METAMATERIALS FOR INVISIBILITY CLOAKING
LIMITATIONS OF METAMATERIALS FOR INVISIBILITY CLOAKING
Electromagnetic invisibility cloak (hide) has begun a new period in the scientific community. With the advent of metamaterials and its recent developments, researchers have now tur...

Back to Top