Please use this identifier to cite or link to this item: https://doi.org/10.3390/s17030464
DC FieldValue
dc.titleToward exposing timing-based probing attacks in web applications
dc.contributor.authorMao, J
dc.contributor.authorChen, Y
dc.contributor.authorShi, F
dc.contributor.authorJia, Y
dc.contributor.authorLiang, Z
dc.date.accessioned2020-09-09T06:26:12Z
dc.date.available2020-09-09T06:26:12Z
dc.date.issued2017
dc.identifier.citationMao, J, Chen, Y, Shi, F, Jia, Y, Liang, Z (2017). Toward exposing timing-based probing attacks in web applications. Sensors (Switzerland) 17 (3) : 464. ScholarBank@NUS Repository. https://doi.org/10.3390/s17030464
dc.identifier.issn1424-8220
dc.identifier.urihttps://scholarbank.nus.edu.sg/handle/10635/175233
dc.description.abstractWeb applications have become the foundation of many types of systems, ranging from cloud services to Internet of Things (IoT) systems. Due to the large amount of sensitive data processed by web applications, user privacy emerges as a major concern in web security. Existing protection mechanisms in modern browsers, e.g., the same origin policy, prevent the users’ browsing information on one website from being directly accessed by another website. However, web applications executed in the same browser share the same runtime environment. Such shared states provide side channels for malicious websites to indirectly figure out the information of other origins. Timing is a classic side channel and the root cause of many recent attacks, which rely on the variations in the time taken by the systems to process different inputs. In this paper, we propose an approach to expose the timing-based probing attacks in web applications. It monitors the browser behaviors and identifies anomalous timing behaviors to detect browser probing attacks. We have prototyped our system in the Google Chrome browser and evaluated the effectiveness of our approach by using known probing techniques. We have applied our approach on a large number of top Alexa sites and reported the suspicious behavior patterns with corresponding analysis results. Our theoretical analysis illustrates that the effectiveness of the timing-based probing attacks is dramatically limited by our approach. © 2017 by the authors. Licensee MDPI, Basel, Switzerland.
dc.publisherMDPI AG
dc.sourceUnpaywall 20200831
dc.subjectData privacy
dc.subjectInternet of things
dc.subjectTiming circuits
dc.subjectWeb services
dc.subjectWebsites
dc.subjectInternet of Things (IOT)
dc.subjectProbing attack
dc.subjectProbing techniques
dc.subjectProtection mechanisms
dc.subjectRuntime environments
dc.subjectSame-origin policy
dc.subjectSide-channel
dc.subjectWEB security
dc.subjectSide channel attack
dc.typeArticle
dc.contributor.departmentDEPARTMENT OF COMPUTER SCIENCE
dc.description.doi10.3390/s17030464
dc.description.sourcetitleSensors (Switzerland)
dc.description.volume17
dc.description.issue3
dc.description.page464
dc.published.statePublished
Appears in Collections:Staff Publications
Elements

Show simple item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
10_3390_s17030464.pdf2.45 MBAdobe PDF

OPEN

NoneView/Download

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.