메뉴 건너뛰기




Volumn , Issue , 2014, Pages 112-123

Scriptless timing attacks on web browser privacy

Author keywords

browsing history; scriptless attack; timing attack; Web privacy

Indexed keywords

TIMING CIRCUITS;

EID: 84912133316     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2014.93     Document Type: Conference Paper
Times cited : (21)

References (32)
  • 2
    • 84912129060 scopus 로고    scopus 로고
    • "CSS, " http://www.w3.org/Style/CSS/.
    • CSS
  • 3
    • 84912128087 scopus 로고    scopus 로고
    • "CSS3, " http://www.w3.org/Style/CSS/current-work.en.html.
    • CSS3
  • 4
    • 84912107219 scopus 로고    scopus 로고
    • "HTML5 IFrame Sandbox, " http://www.w3.org/TR/2011/WD-html5-20110525/the-IFrame-element.html# attr-IFrame-sandbox.
    • HTML5 IFrame Sandbox
  • 7
    • 84912063242 scopus 로고    scopus 로고
    • "NotScripts for Chrome, " https://chrome.google.com/webstore/detail/notscripts/odjhifogjcknibkahlpidmdajjpkkcfn.
    • NotScripts for Chrome
  • 11
    • 35348884907 scopus 로고    scopus 로고
    • Exposing private information by timing web applications
    • A. Bortz and D. Boneh, "Exposing private information by timing web applications, " in WWW, 2007, pp. 621-628.
    • (2007) WWW , pp. 621-628
    • Bortz, A.1    Boneh, D.2
  • 13
    • 77955197190 scopus 로고    scopus 로고
    • Side-channel leaks in web applications: A reality today, a challenge tomorrow
    • S. Chen, R. Wang, X. Wang, and K. Zhang, "Side-channel leaks in web applications: A reality today, a challenge tomorrow, " in IEEE Symposium on Se curity and Privacy, 2010, pp. 191-206.
    • (2010) IEEE Symposium on Se Curity and Privacy , pp. 191-206
    • Chen, S.1    Wang, R.2    Wang, X.3    Zhang, K.4
  • 16
    • 0010512569 scopus 로고
    • A guide to understanding covert channel analysis of trusted systems
    • Tech. Rep
    • V. Gligor, "A guide to understanding covert channel analysis of trusted systems, " National Computer Security Center, Tech. Rep., 1993.
    • (1993) National Computer Security Center
    • Gligor, V.1
  • 17
    • 80051944229 scopus 로고    scopus 로고
    • Dns cache snooping or snooping the cache for fun and profit
    • Tech. Rep
    • L. Grangeia, "DNS cache snooping or snooping the cache for fun and profit, " SideStep Seguranca Digitial, Tech. Rep., 2004.
    • (2004) SideStep Seguranca Digitial
    • Grangeia, L.1
  • 19
    • 34250634485 scopus 로고    scopus 로고
    • Protecting browser state from web privacy attacks
    • C. Jackson,A. Bortz,D. Boneh,J. C. Mitchell Protecting browser state from web privacy attacks in WWW 2006 737-744.
    • (2006) WWW , pp. 737-744
    • Jackson, C.1    Bortz, A.2    Boneh, D.3    Mitchell, J.C.4
  • 20
    • 34250687159 scopus 로고    scopus 로고
    • Invasive browser sniffing and countermeasures
    • M. Jakobsson and S. Stamm, "Invasive browser sniffing and countermeasures, " in WWW, 2006, pp. 523-532.
    • (2006) WWW , pp. 523-532
    • Jakobsson, M.1    Stamm, S.2
  • 21
    • 84860725517 scopus 로고    scopus 로고
    • Feasibility and real-world implications of web browser history detection
    • A. Janc and L. Olejnik, "Feasibility and real-world implications of web browser history detection, " in Web 2.0 security and privacy conference, 2010.
    • (2010) Web 2.0 Security and Privacy Conference
    • Janc, A.1    Olejnik, L.2
  • 28
    • 77954584716 scopus 로고    scopus 로고
    • Reining in the web with content security policy
    • S. Stamm, B. Sterne, and G. Markham, "Reining in the web with content security policy, " in WWW, 2010, pp. 921-930.
    • (2010) WWW , pp. 921-930
    • Stamm, S.1    Sterne, B.2    Markham, G.3
  • 29
    • 80051955689 scopus 로고    scopus 로고
    • I still know what you visited last summer: Leaking browsing history via user interaction and side channel attacks
    • Z. Weinberg, E. Y. Chen, P. R. Jayaraman, and C. Jackson, " I still know what you visited last summer: Leaking browsing history via user interaction and side channel attacks," in IEEE Symposium on Security and Privacy, 2011, pp. 147-161.
    • (2011) IEEE Symposium on Security and Privacy , pp. 147-161
    • Weinberg, Z.1    Chen, E.Y.2    Jayaraman, P.R.3    Jackson, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.