PP0

Dr. Yossi Oren

Ben Gurion University, Israel

Joint work with Anatoly Shusterman, Ayush Agarwal, Sioli O’Connell, Daniel Genkin and Yuval Yarom

The “eternal war in cache” has reached browsers, with multiple cache-based side-channel attacks and countermeasures being suggested. A common approach for countermeasures is to disable or restrict JavaScript features deemed essential for carrying out attacks.

To assess the effectiveness of this approach, in this work we seek to identify those JavaScript features which are essential for carrying out a cache-based attack. We develop a sequence of attacks with progressively decreasing dependency on JavaScript features, culminating in the first browser- based side-channel attack which is constructed entirely from Cascading Style Sheets (CSS) and HTML, and works even when script execution is completely blocked. We then show that avoiding JavaScript features makes our techniques architecturally agnostic, resulting in microarchitectural website fingerprinting attacks that work across hardware platforms including Intel Core, AMD Ryzen, Samsung Exynos, and Apple M1 architectures.


Speaker

Dr. Yossi Oren
a Senior Lecturer at Ben Gurion University's Cyber Security Research Center in Israel.

Link to my site: https://orenlab.sise.bgu.ac.il.