2016
DOI: 10.1007/978-3-319-46598-2_14
|View full text |Cite
|
Sign up to set email alerts
|

MalloryWorker: Stealthy Computation and Covert Channels Using Web Workers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 4 publications
0
11
0
Order By: Relevance
“…In most of the Android cases documented by researchers, information is leaked from one app to another through a covert channel [17,18]. Although Rushanan et al in [19] achieve a goal similar to ours, their study concerns only the desktop environment. Their approach consists in exploiting the Web Workers API in order to increase the CPU and memory utilization.…”
Section: Isolation Of Apps In Androidmentioning
confidence: 77%
“…In most of the Android cases documented by researchers, information is leaked from one app to another through a covert channel [17,18]. Although Rushanan et al in [19] achieve a goal similar to ours, their study concerns only the desktop environment. Their approach consists in exploiting the Web Workers API in order to increase the CPU and memory utilization.…”
Section: Isolation Of Apps In Androidmentioning
confidence: 77%
“…Furthermore, the evaluation done by Rushanan [34] was performed on an old i5 processor and therefore the results are obsolete. It was essential to get more up-to-date results on how an MD5 hasher performs on a browser using a modern CPU, and to compare these results as well.…”
Section: Discussionmentioning
confidence: 99%
“…The feasibility of performing stealthy calculations using HTML5 Web Workers is presented by Rushanan [34]. Web Workers are JavaScripts that run in the background, allowing web applications to spawn background workers in parallel to the main thread.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Kuppan [51] demonstrate this ability of using web workers to perform DDoS attacks. Rushanan et al in [79], also use web workers to perform stealthy computations on the user side and launch not only attacks like DoS and resource depletion but also covert channel using CPU and memory throttling. Pellegrino et al [74] also present different techniques to orchestrate web-based DoS attacks, by utilizing web workers among other HTML5 features, and provide an economic analysis and costs of browser-based botnets.…”
Section: Related Workmentioning
confidence: 99%