Visible to the public Tracking Private Browsing Sessions Using CPU-Based Covert Channels

TitleTracking Private Browsing Sessions Using CPU-Based Covert Channels
Publication TypeConference Paper
Year of Publication2018
AuthorsMatyunin, Nikolay, Anagnostopoulos, Nikolaos A., Boukoros, Spyros, Heinrich, Markus, Schaller, André, Kolinichenko, Maksim, Katzenbeisser, Stefan
Conference NameProceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks
Date PublishedJune 2018
PublisherACM
ISBN Number978-1-4503-5731-9
Keywordsbrowser security, compositionality, covert channels, CPU, CSS, electromagnetic emanations, HTML5, Human Behavior, JavaScript, Metrics, pubcrawl, resilience, Resiliency, Tor, user identification, Web Tracking
Abstract

In this paper we examine the use of covert channels based on CPU load in order to achieve persistent user identification through browser sessions. In particular, we demonstrate that an HTML5 video, a GIF image, or CSS animations on a webpage can be used to force the CPU to produce a sequence of distinct load levels, even without JavaScript or any client-side code. These load levels can be then captured either by another browsing session, running on the same or a different browser in parallel to the browsing session we want to identify, or by a malicious app installed on the device. To get a good estimation of the CPU load caused by the target session, the receiver can observe system statistics about CPU activity (app), or constantly measure time it takes to execute a known code segment (app and browser). Furthermore, for mobile devices we propose a sensor-based approach to estimate the CPU load, based on exploiting disturbances of the magnetometer sensor data caused by the high CPU activity. Captured loads can be decoded and translated into an identifying bit string, which is transmitted back to the attacker. Due to the way loads are produced, these methods are applicable even in highly restrictive browsers, such as the Tor Browser, and run unnoticeably to the end user. Therefore, unlike existing ways of web tracking, our methods circumvent most of the existing countermeasures, as they store the identifying information outside the browsing session being targeted. Finally, we also thoroughly evaluate and assess each presented method of generating and receiving the signal, and provide an overview of potential countermeasures.

URLhttps://dl.acm.org/doi/10.1145/3212480.3212489
DOI10.1145/3212480.3212489
Citation Keymatyunin_tracking_2018