首页> 外文会议>IFIP TC 11 International conference on information security and privacy >Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing
【24h】

Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing

机译:重新探讨了缓存定时攻击:高效且可重复的浏览器历史记录,操作系统和网络嗅探

获取原文

摘要

Cache Timing Attacks (CTAs) have been shown to leak Web browsing history. Until recently, they were deemed a limited threat to individuals' privacy because of their narrow attack surface and vectors, and a lack of robustness and efficiency. Our attack implementation exploits the Web Worker APIs to parallelise cache probing (300 requests/second) and applies time-outs on cache requests to prevent cache pollution. We demonstrate robust cache attacks at the browser, operating system and Web proxy level. Private browsing sessions, HTTPS and corporate intranets are vulnerable. Through case studies of (1) anti-phishing protection in online banking, (2) Web search using the address bar in browsers, (3) publishing of personal images in social media, and (4) use of desktop search, we show that CTAs can seriously compromise privacy and security of individuals and organisations. Options for protection from CTAs are limited. The lack of effective defence, and the ability to mount attacks without cooperation of other websites, makes the improved CTAs serious contenders for cyber-espionage and a broad consumer and corporate surveillance.
机译:缓存定时攻击(CTA)已被证明会泄露Web浏览历史记录。直到最近,由于它们的攻击面和媒介狭窄,并且缺乏鲁棒性和效率,它们被认为是对个人隐私的有限威胁。我们的攻击实现利用Web Worker API来并行化缓存探测(每秒300个请求),并对缓存请求应用超时以防止缓存污染。我们在浏览器,操作系统和Web代理级别展示了强大的缓存攻击。专用浏览会话,HTTPS和公司Intranet容易受到攻击。通过案例研究(1)在线银行中的反网络钓鱼防护,(2)使用浏览器中的地址栏进行网络搜索,(3)在社交媒体中发布个人图像以及(4)使用桌面搜索,我们发现CTAs会严重危害个人和组织的隐私和安全。用于CTAs保护的选项是有限的。缺乏有效的防御能力,以及在没有其他网站合作的情况下发起攻击的能力,使得经过改进的CTAs成为网络间谍活动以及广泛的消费者和公司监视的重要竞争者。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号