2015
DOI: 10.1109/mic.2014.103
|View full text |Cite
|
Sign up to set email alerts
|

I Know Where You've Been: Geo-Inference Attacks via the Browser Cache

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 30 publications
(29 citation statements)
references
References 9 publications
0
29
0
Order By: Relevance
“…The selected experiment results shown in Figure 1 demonstrate that probing websites inevitably invoked some APIs to accumulate privacy information. For example, during the period of our measurement, Date.getTime() is invoked 860 times by a site preforming geo-location inference [18] Therefore, the challenge is to distinguish the repetitive behavior of timing probing attacks, from that of legitimate web applications. From the generalized attack behavior described above, we can see that the distinguishing feature of timing-based probing attacks is the repetition of a group of behaviors (T 1 , W, T 2 ), including a pair of actions to obtain the time and activities for the task.…”
Section: Challengementioning
confidence: 99%
See 2 more Smart Citations
“…The selected experiment results shown in Figure 1 demonstrate that probing websites inevitably invoked some APIs to accumulate privacy information. For example, during the period of our measurement, Date.getTime() is invoked 860 times by a site preforming geo-location inference [18] Therefore, the challenge is to distinguish the repetitive behavior of timing probing attacks, from that of legitimate web applications. From the generalized attack behavior described above, we can see that the distinguishing feature of timing-based probing attacks is the repetition of a group of behaviors (T 1 , W, T 2 ), including a pair of actions to obtain the time and activities for the task.…”
Section: Challengementioning
confidence: 99%
“…We illustrate the basic principle of the cache-based probing attack in Figure 6. To evaluate the effectiveness of the web caching-based attack, we use the attack proposed by Jia et al [18] as the test case. In this attack, a malicious web page needs to measure the loading time of image files, so it is required to call the Date.getTime function after the image is loaded.…”
Section: Web Caching-based Timing Probing Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…In an inference attack, when any of the adversarial peers is the responder/initiator of a request, the adversary can definitely determine which peer is the initiator/responder of the request. By profiling a user's browsing history and preferences with the inference attack, the adversary can infer the victim's digital identity [72] and precise geolocation [52], as well as further abuse the sensitive information for spear phishing, personally targeted advertisements, or even social engineering attacks [54]. Inference attacks in peer-assisted CDNs have not been carefully studied.…”
Section: Inference Attacks and Real-world Examplesmentioning
confidence: 99%
“…For example, a user's digital identity can be revealed when visiting social network websites [72]; visiting map service/political websites reflects a user's geolocation/political orientation [52]. Revealing a user's browsing history will significantly leak the user's privacy.…”
Section: Introductionmentioning
confidence: 99%