Download PDF

ACM SIGSAC Conference on Computer and Communications Security 2015 (CCS 2015), Date: 2015/10/12 - 2015/10/16, Location: Denver, Colorado, USA

Publication date: 2015-10-12
Volume: 2015-October Pages: 1382 - 1393
ISSN: 9781450338325
Publisher: ACM

Proceedings of the 2015 ACM SIGSAC Conference on Computer and Communications Security

Author:

Van Goethem, Tom
Joosen, Wouter ; Nikiforakis, Nick

Keywords:

Science & Technology, Technology, Computer Science, Information Systems, Computer Science, Software Engineering, Computer Science, Theory & Methods, Computer Science, Side-channel attacks, privacy, web-based attacks

Abstract:

Web-based timing attacks have been known for over a decade, and it has been shown that, under optimal network conditions, an adversary can use such an attack to obtain information on the state of a user in a cross-origin website. In recent years, desktop computers have given way to laptops and mobile devices, which are mostly connected over a wireless or mobile network. These connections often do not meet the optimal conditions that are required to reliably perform cross-site timing attacks. In this paper, we show that modern browsers expose new side-channels that can be used to acquire accurate timing measurements, regardless of network conditions. Using several real-world examples, we introduce four novel web-based timing attacks against modern browsers and describe how an attacker can use them to obtain personal information based on a user's state on a cross-origin website. We evaluate our proposed attacks and demonstrate that they significantly outperform current attacks in terms of speed, reliability, and accuracy. Furthermore, we show that the nature of our attacks renders traditional defenses, i.e., those based on randomly delaying responses, moot and discuss possible server-side defense mechanisms.