Cryptology ePrint Archive: Report 2014/959
Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms
Alexander Schaub and Emmanuel Schneider and Alexandros Hollender and Vinicius Calasans and Laurent Jolie and Robin Touillon and Annelie Heuser and Sylvain Guilley and Olivier Rioul
Abstract: Web applications are subject to several types of attacks. In particular, side-channel attacks consist in performing a statistical analysis of the web traffic to gain sensitive information about a client. In this paper, we investigate how side-channel leaks can be used on search engines such as Google or Bing to retrieve the client's search query. In contrast to previous works, due to payload randomization and compression, it is not always possible to uniquely map a search query to a web traffic signature and hence stochastic algorithms must be used. They yield, for the French language, an exact recovery of search word in more than 30% of the cases. Finally, we present some methods to mitigate such side-channel leaks.
Category / Keywords: implementation /
Original Publication (with minor differences): CRiSIS 2014
Date: received 23 Nov 2014
Contact author: sylvain guilley at telecom-paristech fr
Available format(s): PDF | BibTeX Citation
Note: Adding the cipher suite used after handshake between the server and our client in our experiments.
Version: 20141125:204109 (All versions of this report)
Short URL: ia.cr/2014/959
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]