首页> 外文会议>European Symposium on Research in Computer Security >Practical Keystroke Timing Attacks in Sandboxed JavaScript
【24h】

Practical Keystroke Timing Attacks in Sandboxed JavaScript

机译:Sandboxed JavaScript中的实用击键时序攻击

获取原文

摘要

Keystrokes trigger interrupts which can be detected through software side channels to reconstruct keystroke timings. Keystroke timing attacks use these side channels to infer typed words, passphrases, or create user fingerprints. While keystroke timing attacks are considered harmful, they typically require native code execution to exploit the side channels and, thus, may not be practical in many scenarios. In this paper, we present the first generic keystroke timing attack in sandboxed JavaScript, targeting arbitrary other tabs, processes and programs. This violates same-origin policy, HTTPS security model, and process isolation. Our attack is based on the interrupt-timing side channel which has previously only been exploited using native code. In contrast to previous attacks, we do not require the victim to run a malicious binary or interact with the malicious website. Instead, our attack runs in a background tab, possibly in a minimized browser window, displaying a malicious online advertisement. We show that we can observe the exact inter-keystroke timings for a user's PIN or password, infer URLs entered by the user, and distinguish different users time-sharing a computer. Our attack works on personal computers, laptops and smartphones, with different operating systems and browsers. As a solution against all known JavaScript timing attacks, we propose a fine-grained permission model.
机译:击键触发中断,可以通过软件侧通道检测,以重建击键时间。击键时序攻击使用这些侧视通道推断出键入的单词,密码或创建用户指纹。虽然击键串定时攻击被认为是有害的,但它们通常需要本机代码执行来利用侧视通道,因此,在许多场景中可能不是实际的。在本文中,我们在Sandboxed JavaScript中提供了第一个通用击键时序攻击,针对任意其他选项卡,流程和程序。这违反了相同原始策略,HTTPS安全模型和进程隔离。我们的攻击基于中断定时侧信道,该侧频道仅使用本机代码进行了利用。与之前的攻击相比,我们不要求受害者运行恶意二进制或与恶意网站进行互动。相反,我们的攻击在后台选项卡中运行,可能在最小化的浏览器窗口中,显示恶意在线广告。我们表明我们可以观察用户的PIN或密码的确切间歇间隔时间,用户输入的URL,并区分不同的用户时间共享计算机。我们的攻击适用于个人电脑,笔记本电脑和智能手机,具有不同的操作系统和浏览器。作为针对所有已知的JavaScript时序攻击的解决方案,我们提出了一种细粒度的许可模型。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号