What is wrong?

Notice: Before sending an error with the download, please try the direct link first: The Spy in the Sandbox: Practical Cache Attacks in Javascript

Loading...

You must sign in to do that.

Forgot password?

The Spy in the Sandbox: Practical Cache Attacks in Javascript

The Spy in the Sandbox: Practical Cache Attacks in Javascript

The Spy in the Sandbox: Practical Cache Attacks in Javascript

Score: ---- | 0 votes
| Sending vote
| Voted!
|

Book Details:

pos
Global
pos
Category
Year:2015
Publisher:Columbia University
Pages:14 pages
Language:english
Since:23/03/2015
Size:1.04 MB
License:Pending review

Content:

We present the first micro-architectural side-channel attack which runs entirely in the browser. In contrast to other works in this genre, this attack does not require the attacker to install any software on the victim’s machine – to facilitate the attack, the victim needs only to browse to an untrusted webpage with attacker-controlled content. This makes the attack model highly scalable and extremely relevant and practical to today’s web, especially since most desktop browsers currently accessing the Internet are vulnerable to this attack. Our attack, which is an extension of the last-level cache attacks of Yarom et al., allows a remote adversary recover information belonging to other processes, other users and even other virtual machines running on the same physical host as the victim web browser. We describe the fundamentals behind our attack, evaluate its performance using a high bandwidth covert channel and finally use it to construct a system-wide mouse/network activity logger. Defending against this attack is possible, but the required countermeasures can exact an impractical cost on other benign uses of the web browser and of the computer.

Categories:

Tags:

Loading comments...

Scanning lists...

The book in numbers

global rank

online since

23/03/2015

rate score

Nothing yet...

votes

Nothing yet...

Social likes

Nothing yet...

Views

Downloads

This may take several minutes

Interest

Countries segmentation

This may take several minutes

Source Referers

Websites segmentation

evolution

This may take several minutes

Loading...