Tracking Private Browsing Sessions Using CPU-Based Covert Channels
Title | Tracking Private Browsing Sessions Using CPU-Based Covert Channels |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Matyunin, Nikolay, Anagnostopoulos, Nikolaos A., Boukoros, Spyros, Heinrich, Markus, Schaller, André, Kolinichenko, Maksim, Katzenbeisser, Stefan |
Conference Name | Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks |
Date Published | June 2018 |
Publisher | ACM |
ISBN Number | 978-1-4503-5731-9 |
Keywords | browser security, compositionality, covert channels, CPU, CSS, electromagnetic emanations, HTML5, Human Behavior, JavaScript, Metrics, pubcrawl, resilience, Resiliency, Tor, user identification, Web Tracking |
Abstract | In this paper we examine the use of covert channels based on CPU load in order to achieve persistent user identification through browser sessions. In particular, we demonstrate that an HTML5 video, a GIF image, or CSS animations on a webpage can be used to force the CPU to produce a sequence of distinct load levels, even without JavaScript or any client-side code. These load levels can be then captured either by another browsing session, running on the same or a different browser in parallel to the browsing session we want to identify, or by a malicious app installed on the device. To get a good estimation of the CPU load caused by the target session, the receiver can observe system statistics about CPU activity (app), or constantly measure time it takes to execute a known code segment (app and browser). Furthermore, for mobile devices we propose a sensor-based approach to estimate the CPU load, based on exploiting disturbances of the magnetometer sensor data caused by the high CPU activity. Captured loads can be decoded and translated into an identifying bit string, which is transmitted back to the attacker. Due to the way loads are produced, these methods are applicable even in highly restrictive browsers, such as the Tor Browser, and run unnoticeably to the end user. Therefore, unlike existing ways of web tracking, our methods circumvent most of the existing countermeasures, as they store the identifying information outside the browsing session being targeted. Finally, we also thoroughly evaluate and assess each presented method of generating and receiving the signal, and provide an overview of potential countermeasures. |
URL | https://dl.acm.org/doi/10.1145/3212480.3212489 |
DOI | 10.1145/3212480.3212489 |
Citation Key | matyunin_tracking_2018 |