Loophole: Timing Attacks on Shared Event Loops in Chrome

作者: Boris Köpf , Pepe Vila

DOI:

关键词:

摘要: Event-driven programming (EDP) is the prevalent paradigm for graphical user interfaces, web clients, and it rapidly gaining importance server-side network programming. Central components of EDP are {\em event loops}, which act as FIFO queues that used by processes to store dispatch messages received from other processes. In this paper we demonstrate shared loops vulnerable side-channel attacks, where a spy process monitors loop usage pattern enqueueing events measuring time takes them be dispatched. Specifically, exhibit attacks against two central in Google's Chrome browser: I/O thread host process, multiplexes all actions, main renderer processes, handles rendering Javascript tasks. For each these loops, show how can monitored with high resolution low overhead, abused malicious purposes, such page identification, behavior detection, covert communication.

参考文章(20)
Yuval Yarom, Katrina Falkner, None, FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack usenix security symposium. pp. 719- 732 ,(2014)
Dag Arne Osvik, Adi Shamir, Eran Tromer, Cache attacks and countermeasures: the case of AES the cryptographers track at the rsa conference. pp. 1- 20 ,(2006) , 10.1007/11605805_1
Kehuan Zhang, XiaoFeng Wang, Peeping tom in the neighborhood: keystroke eavesdropping on multi-user systems usenix security symposium. pp. 17- 32 ,(2009)
Stefan Mangard, Raphael Spreitzer, Daniel Gruss, Cache template attacks: automating attacks on inclusive last-level caches usenix security symposium. pp. 897- 912 ,(2015)
David Wagner, Dawn Xiaodong Song, Xuqing Tian, Timing analysis of keystrokes and timing attacks on SSH usenix security symposium. pp. 25- 25 ,(2001)
Tom Van Goethem, Wouter Joosen, Nick Nikiforakis, The Clock is Still Ticking: Timing Attacks in the Modern Web computer and communications security. pp. 1382- 1393 ,(2015) , 10.1145/2810103.2813632
Edward W. Felten, Michael A. Schneider, Timing attacks on Web privacy computer and communications security. pp. 25- 32 ,(2000) , 10.1145/352600.352606
Nethanel Gelernter, Amir Herzberg, Cross-Site Search Attacks computer and communications security. pp. 1394- 1405 ,(2015) , 10.1145/2810103.2813688
Simha Sethumadhavan, Angelos D. Keromytis, Yossef Oren, Vasileios P. Kemerlis, The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications computer and communications security. pp. 1406- 1418 ,(2015) , 10.1145/2810103.2813708
Sachin Kadloor, Negar Kiyavash, Parv Venkitasubramaniam, Mitigating timing side channel in shared schedulers IEEE ACM Transactions on Networking. ,vol. 24, pp. 1562- 1573 ,(2016) , 10.1109/TNET.2015.2418194