We identify class of covert channels in browsers that are not mitigated by current defenses, which we call "pool-party" attacks. Pool-party attacks allow sites to create covert channels by manipulating limited-but-unpartitioned resource pools. These class of attacks have been known, but in this work we show that they are both more prevalent, more practical for exploitation, and allow exploitation in more ways, than previously identified. These covert channels have sufficient bandwidth to pass cookies and identifiers across site boundaries under practical and real-world conditions. We identify pool-party attacks in all popular browsers, and show they are practical cross-site tracking techniques (i.e., attacks take 0.6s in Chrome and Edge, and 7s in Firefox and Tor Browser). In this paper we make the following contributions: first, we describe pool-party covert channel attacks that exploit limits in application-layer resource pools in browsers. Second, we demonstrate that pool-party attacks are practical, and can be used to track users in all popular browsers; we also share open source implementations of the attack and evaluate them through a representative web crawl. Third, we show that in Gecko based-browsers (including the Tor Browser) pool-party attacks can also be used for cross-profile tracking (e.g., linking user behavior across normal and private browsing sessions). Finally, we discuss possible mitigation strategies and defenses
翻译:在浏览器中,我们找出了没有被当前防御减缓的隐蔽渠道类别,我们称之为“池边”袭击。 池边袭击允许网站通过操纵有限但非分割的资源库创建隐蔽渠道。 这些类型的袭击是已知的,但在这项工作中,我们表明它们比以前确定的那样更加普遍、更便于开发,并允许以比以前确定得多的方式进行利用。 这些隐蔽渠道有足够的带宽,可以在实际和实际世界条件下跨站点边界传递曲奇和识别器。 我们在所有受欢迎的浏览器中识别集合方袭击,并表明它们是实用的跨地点跟踪技术(即袭击在Chrome和Edge中采用0.6,在Firefox和Tor Browrookr中采用7s)。 在本文中,我们做了以下贡献:首先,我们描述池边秘密渠道袭击,利用浏览器中的应用限制。 其次,我们证明联营方袭击是实用的,可以用来跟踪所有受欢迎的浏览器中的用户;我们还共享袭击的公开源实施情况,并通过具有代表性的网络-包括浏览器的链接式浏览器,我们展示了这些攻击过程。 第三次,我们展示了以最终的网络式浏览器式浏览器式的网络- 。我们展示了在最后的网络上可以进行。