Attacking suggest boxes in web applications over HTTPS using side-channel stochastic algorithms

  • Alexander Schaub
  • , Emmanuel Schneider
  • , Alexandros Hollender
  • , Vinicius Calasans
  • , Laurent Jolie
  • , Robin Touillon
  • , Annelie Heuser
  • , Sylvain Guilley
  • , Olivier Rioul

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Web applications are subject to several types of attacks. In particular, side-channel attacks consist in performing a statistical analysis of the web traffic to gain sensitive information about a client. In this paper, we investigate how side-channel leaks can be used on search engines such as Google or Bing to retrieve the client’s search query. In contrast to previous works, due to payload randomization and compression, it is not always possible to uniquely map a search query to a web traffic signature and hence stochastic algorithms must be used. They yield, for the French language, an exact recovery of search word in more than 30% of the cases. Finally, we present some methods to mitigate such side-channel leaks.

Original languageEnglish
Title of host publicationRisks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Revised Selected Papers
EditorsIndrajit Ray, Bruno Crispo, Javier Lopez
PublisherSpringer Verlag
Pages116-130
Number of pages15
ISBN (Print)9783319171265
DOIs
Publication statusPublished - 1 Jan 2015
Event9th International Conference on Risks and Security of Internet and Systems, CRiSIS 2014 - Trento, Italy
Duration: 27 Aug 201429 Aug 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8924
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th International Conference on Risks and Security of Internet and Systems, CRiSIS 2014
Country/TerritoryItaly
CityTrento
Period27/08/1429/08/14

Keywords

  • HTTPS
  • Side-channel leak
  • Stochastic algorithms
  • Suggest box
  • Web application

Fingerprint

Dive into the research topics of 'Attacking suggest boxes in web applications over HTTPS using side-channel stochastic algorithms'. Together they form a unique fingerprint.

Cite this