I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks

作者: Zachary Weinberg , Eric Y. Chen , Pavithra Ramesh Jayaraman , Collin Jackson

DOI: 10.1109/SP.2011.23

关键词:

摘要: History sniffing attacks allow web sites to learn about users' visits other sites. The major browsers have recently adopted a defense against the current strategies for history sniffing. In user study with 307 participants, we demonstrate that remains feasible via interactive techniques which are not covered by defense. While these slower and cannot hope as much browsing history, see no practical way defend them.

参考文章(27)
A. E. Cawkell, Multimedia and hypertext World information technology manual. pp. 674- 708 ,(1991)
Robert Cailliau, Timothy J Berners-Lee, WorldWideWeb : proposal for a HyperText Project ,(1990)
Henry Levy, Anna Karlin, Tashana Landray, Denise Pinnel, Alec Wolman, Neal Cardwell, Molly Brown, Geoff Voelker, Nitin Sharma, Organization-based analysis of web-object sharing and caching usenix symposium on internet technologies and systems. pp. 3- 3 ,(1999)
Fabian Monrose, Srinivas Krishnan, DNS prefetching and its privacy implications: when good things go bad usenix conference on large scale exploits and emergent threats. pp. 10- 10 ,(2010)
Massimo Marchiori, Lorrie Cranor, Marc Langheinrich, Martin Presler-Marshall, Joseph Reagle, The platform for privacy preferences 1.0 (p3p1.0) specification W3C Recommendation. ,(2002)
Elie Bursztein, Dan Boneh, Collin Jackson, Gaurav Aggarwal, An analysis of private browsing modes in modern browsers usenix security symposium. pp. 6- 6 ,(2010)
Panagiotis G. Ipeirotis, Demographics of Mechanical Turk Social Science Research Network. ,(2010)
Luis von Ahn, Manuel Blum, Nicholas J. Hopper, John Langford, CAPTCHA: using hard AI problems for security theory and application of cryptographic techniques. pp. 294- 311 ,(2003) , 10.1007/3-540-39200-9_18
Artur Janc, Lukasz Olejnik, Web browser history detection as a real-world privacy threat european symposium on research in computer security. pp. 215- 231 ,(2010) , 10.1007/978-3-642-15497-3_14