首页> 外文会议>ACM SIGSAC Conference on Computer and Communications Security >The Clock is Still Ticking: Timing Attacks in the Modern Web
【24h】

The Clock is Still Ticking: Timing Attacks in the Modern Web

机译:时钟仍在滴答:现代网络中的时序攻击

获取原文

摘要

Web-based timing attacks have been known for over a decade, and it has been shown that, under optimal network conditions, an adversary can use such an attack to obtain information on the state of a user in a cross-origin website. In recent years, desktop computers have given way to laptops and mobile devices, which are mostly connected over a wireless or mobile network. These connections often do not meet the optimal conditions that are required to reliably perform cross-site timing attacks. In this paper, we show that modern browsers expose new side-channels that can be used to acquire accurate timing measurements, regardless of network conditions. Using several real-world examples, we introduce four novel web-based timing attacks against modern browsers and describe how an attacker can use them to obtain personal information based on a user's state on a cross-origin website. We evaluate our proposed attacks and demonstrate that they significantly outperform current attacks in terms of speed, reliability, and accuracy. Furthermore, we show that the nature of our attacks renders traditional defenses, i.e., those based on randomly delaying responses, moot and discuss possible server-side defense mechanisms.
机译:已经在十年中已知基于网络的定时攻击,并且已经表明,在最佳网络条件下,对手可以使用这种攻击来获取关于跨起源网站中用户状态的信息。近年来,台式计算机已经给了笔记本电脑和移动设备,它主要通过无线或移动网络连接。这些连接通常不符合可靠地执行跨站点定时攻击所需的最佳条件。在本文中,我们表明现代浏览器暴露了新的侧视通道,可用于获取准确的时序测量,无论网络条件如何。使用几个真实世界的例子,我们介绍了对现代浏览器的四个新的基于Web的时序攻击,并描述了攻击者如何使用它们基于跨起轨网站上的用户状态来获取个人信息。我们评估我们提出的攻击,并证明它们在速度,可靠性和准确性方面显着优于当前攻击。此外,我们表明,我们的攻击性质使传统防御,即基于随机延迟的响应,实际上和讨论可能的服务器端防御机制。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号