Implementing side-channel attacks on suggest boxes in web applications

  • Authors:
  • Sampreet A. Sharma;Bernard L. Menezes

  • Affiliations:
  • IIT-Bombay, Powai, Mumbai, India;IIT-Bombay, Powai, Mumbai, India

  • Venue:
  • Proceedings of the First International Conference on Security of Internet of Things
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

With the proliferation of web applications and web services, attacks such as cross-site scripting (XSS), SQL injection etc have increased dramatically. Apart from these well known attacks, it has been shown that side-channel leaks in web applications can be used to infer sensitive user information - [5]. For example, a side-channel attack may use the packet traffic pattern between client and server to gain sensitive information about the user. We explore the practicality of one such side-channel attack where the attacker deduces what was entered in the search suggest box (auto complete user input) by just observing the sizes of the packets exchanged between a user and an access point. All packets are exchanged between the two entities in a WPA/WPA2 secured WiFi network. The attack succeeds despite the packets being encrypted. We present complete details of our attack and report its effectiveness on well known sites such as Google, YouTube and Wikipedia.