Cryptology ePrint Archive: Report 2014/959

Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms

Alexander Schaub and Emmanuel Schneider and Alexandros Hollender and Vinicius Calasans and Laurent Jolie and Robin Touillon and Annelie Heuser and Sylvain Guilley and Olivier Rioul

Abstract: Web applications are subject to several types of attacks. In particular, side-channel attacks consist in performing a statistical analysis of the web traffic to gain sensitive information about a client. In this paper, we investigate how side-channel leaks can be used on search engines such as Google or Bing to retrieve the client's search query. In contrast to previous works, due to payload randomization and compression, it is not always possible to uniquely map a search query to a web traffic signature and hence stochastic algorithms must be used. They yield, for the French language, an exact recovery of search word in more than 30% of the cases. Finally, we present some methods to mitigate such side-channel leaks.

Category / Keywords: implementation /

Original Publication (with minor differences): CRiSIS 2014

Date: received 23 Nov 2014

Contact author: sylvain guilley at telecom-paristech fr

Available format(s): PDF | BibTeX Citation

Note: Adding the cipher suite used after handshake between the server and our client in our experiments.

Version: 20141125:204109 (All versions of this report)

Short URL: ia.cr/2014/959

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]