We identify class of covert channels in browsers that are not mitigated by current defenses, which we call "pool-party" attacks. Pool-party attacks allow sites to create covert channels by manipulating limited-but-unpartitioned resource pools. These class of attacks have been known, but in this work we show that they are both more prevalent, more practical for exploitation, and allow exploitation in more ways, than previously identified. These covert channels have sufficient bandwidth to pass cookies and identifiers across site boundaries under practical and real-world conditions. We identify pool-party attacks in all popular browsers, and show they are practical cross-site tracking techniques (i.e., attacks take 0.6s in Chrome and Edge, and 7s in Firefox and Tor Browser). In this paper we make the following contributions: first, we describe pool-party covert channel attacks that exploit limits in application-layer resource pools in browsers. Second, we demonstrate that pool-party attacks are practical, and can be used to track users in all popular browsers; we also share open source implementations of the attack and evaluate them through a representative web crawl. Third, we show that in Gecko based-browsers (including the Tor Browser) pool-party attacks can also be used for cross-profile tracking (e.g., linking user behavior across normal and private browsing sessions). Finally, we discuss possible mitigation strategies and defenses
翻译:我们确定了一类在浏览器中的隐蔽通道,并且当前防御措施无法防御,我们称之为“池派对”攻击。池派对攻击允许网站通过操纵有限但未分区的资源池来创建隐蔽通道。这类攻击已经被人们所知,但在这项工作中,我们展示它们比先前已知的更加普遍、更容易被攻击,并且允许更多方式的攻击方法。恶意网站使用池派对攻击可以在实际和现实环境下足够带宽地在网站边界上传递Cookie和标识符。我们在所有主流浏览器中发现了池派对攻击,并且展示了它们是实用的跨站点跟踪技术(即攻击在Chrome和Edge中需要0.6秒,在Firefox和Tor浏览器中需要7秒)。在本文中,我们做出了以下贡献:首先,我们描述了利用浏览器应用层资源池中的限制构建池派对隐蔽通道攻击。其次,我们证明了池派对攻击是实用的,并且可以在所有主流浏览器中用于跟踪用户,我们还通过一个具有代表性的网络爬行的开源实现对它们进行评估。第三,我们展示在基于Gecko的浏览器(包括Tor浏览器)中,池派对攻击也可以用于跨配置文件跟踪(例如,链接用户在正常浏览会话和隐私浏览会话中的行为)。最后,我们讨论了可能的缓解策略和防御。