Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Springer Nature Link
Log in

Browser-Based CPU Fingerprinting

  • Conference paper
  • First Online:

Part of the book series:Lecture Notes in Computer Science ((LNCS,volume 13556))

Included in the following conference series:

  • 3023Accesses

Abstract

Mounting microarchitectural attacks, such as Spectre or Rowhammer, is possible from browsers. However, to be realistically exploitable, they require precise knowledge about microarchitectural properties. While a native attacker can easily query many of these properties, the sandboxed environment in browsers prevents this. In this paper, we present six side-channel-related benchmarks that reveal CPU properties, such as cache sizes or cache associativities. Our benchmarks are implemented in JavaScript and run in unmodified browsers on multiple platforms. Based on a study with 834 participants using 297 different CPU models, we show that we can infer microarchitectural properties with an accuracy of up to 100%. Combining multiple properties also allows identifying the CPU vendor with an accuracy of 97.5%, and the microarchitecture and CPU model each with an accuracy of above 60%. The benchmarks are unaffected by current side-channel and browser fingerprinting mitigations, and can thus be used for more targeted attacks and to increase the entropy in browser fingerprinting.

This is a preview of subscription content,log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Similar content being viewed by others

References

  1. Agarwal, A., et al.: Spook.js: Attacking chrome strict site isolation via speculative execution (2022)

    Google Scholar 

  2. Bosman, E., Razavi, K., Bos, H., Giuffrida, C.: Dedup Est machina: memory deduplication as an advanced exploitation vector. In: S &P (2016)

    Google Scholar 

  3. Canella, C., et al.: Leaking Data on Meltdown-resistant CPUs. In: CCS (2019)

    Google Scholar 

  4. Canella, C., et al.: A Systematic Evaluation of Transient Execution Attacks and Defenses. In: USENIX Security Symposium, extended classification tree and PoCs (2019).https://transient.fail/

  5. Cao, Y., Li, S., Wijmans, E.: Browser Fingerprinting via OS and Hardware Level Features. In: NDSS (2017)

    Google Scholar 

  6. Easdon, C., Schwarz, M., Schwarzl, M., Gruss, D.: Rapid Prototyping for Microarchitectural Attacks. In: USENIX Security (2022)

    Google Scholar 

  7. Eckersley, P.: How unique is your web browser? In: PETS (2010)

    Google Scholar 

  8. Englehardt, S., Narayanan, A.: Online tracking: a 1-million-site measurement and analysis. In: CCS (2016)

    Google Scholar 

  9. Gras, B., Razavi, K.: ASLR on the Line: Practical Cache Attacks on the MMU. In: NDSS (2017)

    Google Scholar 

  10. Gruss, D., Bidner, D., Mangard, S.: Practical memory deduplication attacks in sandboxed javascript. In: ESORICS (2015)

    Google Scholar 

  11. Gruss, D., Maurice, C., Mangard, S.: Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript. In: DIMVA (2016)

    Google Scholar 

  12. Handley, M.: M1 Exploration - v0.70 (2021)

    Google Scholar 

  13. Herath, N., Fogh, A.: These are Not Your Grand Daddys CPU Performance Counters - CPU Hardware Performance Counters for Security. In: Black Hat Briefings (2015)

    Google Scholar 

  14. Intel: Intel 64 and IA-32 Architectures Optimization Reference Manual (2019)

    Google Scholar 

  15. Kim, Y., et al.: Flipping Bits in Memory Without Accessing Them: an Experimental Study of DRAM Disturbance Errors. In: ISCA (2014)

    Google Scholar 

  16. Kocher, P., et al.: Spectre attacks: exploiting speculative execution. In: S &P (2019)

    Google Scholar 

  17. Kohlbrenner, D., Shacham, H.: Trusted browsers for uncertain times. In: USENIX Security Symposium (2016)

    Google Scholar 

  18. Laperdrix, P., Bielova, N., Baudry, B., Avoine, G.: Browser fingerprinting: a survey. In: ACM Transactions on the Web (2020)

    Google Scholar 

  19. Laperdrix, P., Rudametkin, W., Baudry, B.: Beauty and the beast: diverting modern web browsers to build unique browser fingerprints. In: S &P (2016)

    Google Scholar 

  20. Lipp, M., et al.: Meltdown: reading Kernel memory from user space. In: USENIX Security Symposium (2018)

    Google Scholar 

  21. Mowery, K., Bogenreif, D., Yilek, S., Shacham, H.: Fingerprinting information in JavaScript implementations. In: W2SP (2011)

    Google Scholar 

  22. Mowery, K., Shacham, H.: Pixel perfect: fingerprinting canvas in HTML5. In: W2SP (2012)

    Google Scholar 

  23. Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., Vigna, G.: Cookieless monster: Exploring the ecosystem of web-based device fingerprinting. In: Security and privacy (SP) (2013)

    Google Scholar 

  24. Olejnik, L., Englehardt, S., Narayanan, A.: Battery status not included: assessing privacy in web standards. In: Workshop on Privacy Engineering (IWPE) (2017)

    Google Scholar 

  25. Payer, M.: HexPADS: a platform to detect "stealth" attacks. In: ESSoS (2016)

    Google Scholar 

  26. Pedregosa, F., et al.: Scikit-learn: Machine learning in Python. J. Mach. Learn. Res.12, pp. 2825–2830 (2011)

    Google Scholar 

  27. Ragab, H., Milburn, A., Razavi, K., Bos, H., Giuffrida, C.: CrossTalk: speculative data leaks across cores are real. In: S &P (2021)

    Google Scholar 

  28. Röttger, S.: Escaping the Chrome Sandbox with RIDL (2020).https://googleprojectzero.blogspot.com/2020/02/escaping-chrome-sandbox-with-ridl.html

  29. Saito, T., et al.: Estimating CPU features by browser fingerprinting. In: International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS) (2016)

    Google Scholar 

  30. Saito, T., Yasuda, K., Tanabe, K., Takahashi, K.: Web browser tampering: Inspecting CPU features from side-channel information. In: International Conference on Broad-Band Wireless Computing, Communication and Applications, BWCCA (2017)

    Google Scholar 

  31. Sanchez-Rola, I., Santos, I., Balzarotti, D.: Clock around the clock: time-based device fingerprinting. In: CCS (2018)

    Google Scholar 

  32. van Schaik, S., et al.: RIDL: Rogue In-flight Data Load. In: S &P (2019)

    Google Scholar 

  33. Schwarz, M., Lackner, F., Gruss, D.: Javascript template attacks: automatically inferring host information for targeted exploits. In: NDSS (2019)

    Google Scholar 

  34. Schwarz, M., Lipp, M., Gruss, D.: Javascript zero: real javascript and zero side-channel attacks. In: NDSS (2018)

    Google Scholar 

  35. Schwarz, M., et al.: ZombieLoad: cross-privilege-boundary data sampling. In: CCS (2019)

    Google Scholar 

  36. Schwarz, M., Maurice, C., Gruss, D., Mangard, S.: fantastic timers and where to find them: high-resolution microarchitectural attacks in javascript. In: FC (2017)

    Google Scholar 

  37. Schwarzl, M., et al.: Dynamic process isolation.arXiv:2110.04751 (2021)

  38. Shusterman, A., Agarwal, A., O’Connell, S., Genkin, D., Oren, Y., Yarom, Y.: Prime+probe 1, javascript 0: overcoming browser-based side-channel defenses. In: USENIX Security Symposium (2021)

    Google Scholar 

  39. Röttger, S., Janc, A.: A Spectre proof-of-concept for a Spectre-proof web (2021).https://security.googleblog.com/2021/03/a-spectre-proof-of-concept-for-spectre.html

  40. Van Bulck, J., et al.: LVI: hijacking transient execution through microarchitectural load value injection. In: S &P (2020)

    Google Scholar 

  41. Vastel, A., Laperdrix, P., Rudametkin, W., Rouvoy, R.: Fp-stalker: Tracking browser fingerprint evolutions. In: S &P (2018)

    Google Scholar 

  42. Vila, P., Köpf, B., Morales, J.: Theory and practice of finding eviction sets. In: S &P (2019)

    Google Scholar 

  43. VUSec: RIDL test suite and exploits (GitHub) (2020).https://github.com/vusec/ridl

  44. Wang, H., Sayadi, H., Sasan, A., Rafatirad, S., Homayoun, H.: Hybrid-shield: accurate and efficient cross-layer countermeasure for run-time detection and mitigation of cache-based side-channel attacks. In: ICCAD (2020)

    Google Scholar 

Download references

Acknowledgments

We would like to thank all participants of our study. This work has been supported by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) - 491039149. We further thank the Saarbrücken Graduate School of Computer Science for their funding and support.

Author information

Authors and Affiliations

  1. CISPA Helmholtz Center for Information Security, Saarbrücken, SL, Germany

    Leon Trampert, Christian Rossow & Michael Schwarz

Authors
  1. Leon Trampert

    You can also search for this author inPubMed Google Scholar

  2. Christian Rossow

    You can also search for this author inPubMed Google Scholar

  3. Michael Schwarz

    You can also search for this author inPubMed Google Scholar

Corresponding author

Correspondence toLeon Trampert.

Editor information

Editors and Affiliations

  1. Rutgers University, Newark, NJ, USA

    Vijayalakshmi Atluri

  2. Hamad Bin Khalifa University, Doha, Qatar

    Roberto Di Pietro

  3. Technical University of Denmark, Kongens Lyngby, Denmark

    Christian D. Jensen

  4. Technical University of Denmark, Kongens Lyngby, Denmark

    Weizhi Meng

Rights and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Trampert, L., Rossow, C., Schwarz, M. (2022). Browser-Based CPU Fingerprinting. In: Atluri, V., Di Pietro, R., Jensen, C.D., Meng, W. (eds) Computer Security – ESORICS 2022. ESORICS 2022. Lecture Notes in Computer Science, vol 13556. Springer, Cham. https://doi.org/10.1007/978-3-031-17143-7_5

Download citation

Publish with us

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide -see info

Tax calculation will be finalised at checkout

Purchases are for personal use only


[8]ページ先頭

©2009-2025 Movatter.jp