Loading...

A study of timing side-channel attacks and countermeasures on javascript and webassembly

Mazaheri, M. E ; Sharif University of Technology | 2022

45 Viewed
  1. Type of Document: Article
  2. DOI: 10.22042/isecure.2021.263565.599
  3. Publisher: Iranian Society of Cryptology , 2022
  4. Abstract:
  5. Side-channel attacks are a group of powerful attacks in hardware security that exploit the deficiencies in the implementation of systems. Timing side-channel attacks are one of the main side-channel attack categories that use the time difference of running an operation in different states. Many powerful attacks can be classified into this type of attack, including cache attacks. The limitation of these attacks is the need to run the spy program on the victim’s system. Various studies have tried to overcome this limitation by implementing these attacks remotely on JavaScript and WebAssembly. This paper provides the first comprehensive evaluation of timing side-channel attacks on JavaScript and investigates challenges and countermeasures to overcome these attacks. Moreover, by investigating the countermeasures and their strengths and weaknesses, we introduce a detection-based approach, called Lurking Eyes. Our approach has the least reduction in the performance of JavaScript and WebAssembly. The evaluation results show that the Lurking eyes have an accuracy of 0.998, precision of 0.983, and F-measure of 0.983. Considering these values and no limitations, this method can be introduced as an effective way to counter timing side-channel attacks on JavaScript and WebAssembly. Also, we provide a new accurate timer, named Eagle timer, based on WebAssembly memory for implementing these attacks. © 2020 ISC. All rights reserved
  6. Keywords:
  7. JavaScript ; Malicious Code Detection ; Timers ; Timing Side-Channel Attacks ; WebAssembly
  8. Source: ISeCure ; Volume 14, Issue 1 , 2022 , Pages 27-46 ; 20082045 (ISSN)
  9. URL: https://www.isecure-journal.com/article_136367.html