Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
DOI: 10.1145/3133956.3133996
|View full text |Cite
|
Sign up to set email alerts
|

Deterministic Browser

Abstract: Timing attacks have been a continuous threat to users' privacy in modern browsers. To mitigate such attacks, existing approaches, such as Tor Browser and Fermata, add jitters to the browser clock so that an attacker cannot accurately measure an event. However, such defenses only raise the bar for an attacker but do not fundamentally mitigate timing attacks, i.e., it just takes longer than previous to launch a timing attack.In this paper, we propose a novel approach, called deterministic browser, which can prov… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(27 citation statements)
references
References 31 publications
0
27
0
Order By: Relevance
“…Precise timers serve as a key building block for a variety of side-channel attacks and for this reason a number of stateof-the-art defenses specifically aim to remove the attackers' ability to construct them [9], [29], [44]. We will show that our GPU-based timers bypass such novel defenses.…”
Section: Gpu-based Attacksmentioning
confidence: 98%
See 3 more Smart Citations
“…Precise timers serve as a key building block for a variety of side-channel attacks and for this reason a number of stateof-the-art defenses specifically aim to remove the attackers' ability to construct them [9], [29], [44]. We will show that our GPU-based timers bypass such novel defenses.…”
Section: Gpu-based Attacksmentioning
confidence: 98%
“…To compromise the target system, we assume the attacker can only rely on microarchitectural attacks by harnessing the primitives provided by the GPU. We also assume a target system with all defenses up, including advanced research defenses (applicable to the ARM platform), which hamper reliable timing sources in the browser [9], [29] and protect kernel memory from Rowhammer attacks [8].…”
Section: Threat Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…At this point, the return instruction in step (5) returns from B to A and triggers the first misprediction. In step (6), N A more returns will be executed, all of them mispredicting B as the return target. The state of the RSB (shortened to N = 4) after each of these steps is also depicted in Figure 2.…”
Section: Webassembly-based Speculationmentioning
confidence: 99%