Enabling secure modern web browsers against cache-based timing attacks
by Sangeetha Ganesan
International Journal of Security and Networks (IJSN), Vol. 19, No. 1, 2024

Abstract: Web applications have grown to be the foundation of any kind of system, ranging from cloud services to the internet of things (IoT) systems. As a huge amount of sensitive data is processed in web applications, user privacy shows as the most important concern in web security. In the virtualisation system, cache side channel (CSC) attack techniques have become popular to retrieve the secret information of other users. This paper presents a run-time detection and prevention mechanism, called browser watcher (BW), for time-driven CSC attacks. The computation overhead of the proposed BW java script engine is monitored and tabulated for the different domains. The average cache miss rate is measured from 23% to 89%. Once the BW system identifies the attacker, then it prevents stealing the secret information of the victim. This makes it very hard for the attacker to find the memory access pattern of the victim.

Online publication date: Tue, 12-Mar-2024

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Security and Networks (IJSN):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com