Cargando…

Toward Exposing Timing-Based Probing Attacks in Web Applications †

Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in m...

Descripción completa

Detalles Bibliográficos
Autores principales: Mao, Jian, Chen, Yue, Shi, Futian, Jia, Yaoqi, Liang, Zhenkai
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5375750/
https://www.ncbi.nlm.nih.gov/pubmed/28245610
http://dx.doi.org/10.3390/s17030464
_version_ 1782519048535277568
author Mao, Jian
Chen, Yue
Shi, Futian
Jia, Yaoqi
Liang, Zhenkai
author_facet Mao, Jian
Chen, Yue
Shi, Futian
Jia, Yaoqi
Liang, Zhenkai
author_sort Mao, Jian
collection PubMed
description Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users’ browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach.
format Online
Article
Text
id pubmed-5375750
institution National Center for Biotechnology Information
language English
publishDate 2017
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-53757502017-04-10 Toward Exposing Timing-Based Probing Attacks in Web Applications † Mao, Jian Chen, Yue Shi, Futian Jia, Yaoqi Liang, Zhenkai Sensors (Basel) Article Web applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users’ browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach. MDPI 2017-02-25 /pmc/articles/PMC5375750/ /pubmed/28245610 http://dx.doi.org/10.3390/s17030464 Text en © 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Mao, Jian
Chen, Yue
Shi, Futian
Jia, Yaoqi
Liang, Zhenkai
Toward Exposing Timing-Based Probing Attacks in Web Applications †
title Toward Exposing Timing-Based Probing Attacks in Web Applications †
title_full Toward Exposing Timing-Based Probing Attacks in Web Applications †
title_fullStr Toward Exposing Timing-Based Probing Attacks in Web Applications †
title_full_unstemmed Toward Exposing Timing-Based Probing Attacks in Web Applications †
title_short Toward Exposing Timing-Based Probing Attacks in Web Applications †
title_sort toward exposing timing-based probing attacks in web applications †
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5375750/
https://www.ncbi.nlm.nih.gov/pubmed/28245610
http://dx.doi.org/10.3390/s17030464
work_keys_str_mv AT maojian towardexposingtimingbasedprobingattacksinwebapplications
AT chenyue towardexposingtimingbasedprobingattacksinwebapplications
AT shifutian towardexposingtimingbasedprobingattacksinwebapplications
AT jiayaoqi towardexposingtimingbasedprobingattacksinwebapplications
AT liangzhenkai towardexposingtimingbasedprobingattacksinwebapplications