3.8 Proceedings Paper

Memento: Learning Secrets from Process Footprints

期刊

出版社

IEEE
DOI: 10.1109/SP.2012.19

关键词

-

资金

  1. Direct For Computer & Info Scie & Enginr
  2. Division Of Computer and Network Systems [0905602] Funding Source: National Science Foundation
  3. Direct For Computer & Info Scie & Enginr
  4. Division Of Computer and Network Systems [0746888] Funding Source: National Science Foundation

向作者/读者索取更多资源

We describe a new side-channel attack. By tracking changes in the application's memory footprint, a concurrent process belonging to a different user can learn its secrets. Using Web browsers as the target, we show how an unprivileged, local attack process-for example, a malicious Android app-can infer which page the user is browsing, as well as finer-grained information: whether she is a paid customer, her interests, etc. This attack is an instance of a broader problem. Many isolation mechanisms in modern systems reveal accounting information about program execution, such as memory usage and CPU scheduling statistics. If temporal changes in this public information are correlated with the program's secrets, they can lead to a privacy breach. To illustrate the pervasiveness of this problem, we show how to exploit scheduling statistics for keystroke sniffing in Linux and Android, and how to combine scheduling statistics with the dynamics of memory usage for more accurate adversarial inference of browsing behavior.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

3.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据