Nytro Posted July 9, 2014 Report Posted July 9, 2014 Scriptless Timing Attacks onWeb Browser PrivacyMario HeiderichRuhr-University Bochum, Germanymario.heiderich@rub.deBin Liang, Wei You, Liangkun Liu, Wenchang ShiRenmin University of China, Beijing, P. R. China{liangb, youwei, lacon, wenchang}@ruc.edu.cnAbstract—The existing Web timing attack methods areheavily dependent on executing client-side scripts to measurethe time. However, many techniques have been proposed toblock the executions of suspicious scripts recently. This paperpresents a novel timing attack method to sniff users’ browsinghistories without executing any scripts. Our method is basedon the fact that when a resource is loaded from the localcache, its rendering process should begin earlier than when itis loaded from a remote website. We leverage some CascadingStyle Sheets (CSS) features to indirectly monitor the renderingof the target resource. Three practical attack vectors aredeveloped for different attack scenarios and applied to sixpopular desktop and mobile browsers. The evaluation showsthat our method can effectively sniff users’ browsing historieswith very high precision. We believe that modern browsersprotected by script-blocking techniques are still likely to sufferserious privacy leakage threats.Keywords-timing attack; scriptless attack; Web privacy;browsing history;Download: http://www.nds.rub.de/media/nds/veroeffentlichungen/2014/07/09/DSN_paper.pdf Quote