网站指纹攻击综述
A Review of Website Fingerprinting Attacks
DOI: 10.12677/csa.2024.1411213, PDF,   
作者: 冯雨思:中国科学院信息工程研究所,北京;中国科学院大学网络空间安全学院,北京
关键词: 网站指纹攻击侧信道机器学习Website Fingerprinting Attacks Side Channel Machine Learning
摘要: 网站指纹攻击利用统计方法来确定用户正在访问的网站,侵犯用户隐私,给互联网的安全和隐私带来了巨大挑战。网站指纹攻击首先收集用户访问不同网站时的数据,然后使用机器学习等方法处理数据,识别网站。之前的研究主要集中于传统的基于网络流量的网站指纹攻击,本文重点介绍了较新出现的基于主机侧信道的网站指纹攻击,并讨论了这两类攻击的流程、指纹特征、威胁模型、分类方法、评价指标和防御研究。文章最后展望了网站指纹攻击的未来研究方向,尤其是新式的基于主机侧信道数据的网站指纹攻击当前存在的问题及未来发展方向。
Abstract: Website fingerprinting attacks utilize statistical methods to identify which websites a user is visiting, thereby infringing on user privacy and posing significant challenges to internet security and privacy. These attacks first collect data generated when a user visits different websites and then use methods such as machine learning to process the data and identify the websites. Previous research has mainly focused on traditional network traffic-based website fingerprinting attacks. This paper highlights the more recently emerged host-side channel-based website fingerprinting attacks and discusses the process, fingerprinting characteristics, threat models, classification methods, evaluation metrics, and defense measures of these two types of attacks. Finally, this paper provides an outlook on the future research directions of website fingerprinting attacks, particularly addressing the current issues and future development of host-side channel-based website fingerprinting attacks.
文章引用:冯雨思. 网站指纹攻击综述[J]. 计算机科学与应用, 2024, 14(11): 28-38. https://doi.org/10.12677/csa.2024.1411213

参考文献

[1] Giovanni, C., Jansen, R. and Troncoso, C. (2022) Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World. 2022 31st USENIX Security Symposium (USENIX Security 22), Boston, 10-12 August 2022, 753-770.
[2] Liu, P., He, L. and Li, Z. (2023) A Survey on Deep Learning for Website Fingerprinting Attacks and Defenses. IEEE Access, 11, 26033-26047. [Google Scholar] [CrossRef
[3] Zhang, X., Zhang, Z., Shen, Q., Wang, W., Gao, Y., Yang, Z., et al. (2024) Segscope: Probing Fine-Grained Interrupts via Architectural Footprints. 2024 IEEE International Symposium on High-Performance Computer Architecture, Edinburgh, 2-6 March 2024, 424-438. [Google Scholar] [CrossRef
[4] Dipta, D.R. and Gulmezoglu, B. (2022) DF-SCA: Dynamic Frequency Side Channel Attacks Are Practical. Proceedings of the 38th Annual Computer Security Applications Conference, Austin, 5-9 December 2022, 841-853. [Google Scholar] [CrossRef
[5] Zhang, Z., Liang, S., Yao, F. and Gao, X. (2021) Red Alert for Power Leakage: Exploiting Intel RAPL-Induced Side Channels. Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, New York, 7-11 June 2021, 162-175. [Google Scholar] [CrossRef
[6] Wang, Z., Guan, J., Wang, X., Wang, W., Xing, L. and Alharbi, F. (2023) The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on Ios through Multi-Side-Channel Learning. Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, New York, 26-30 November 2023, 281-295. [Google Scholar] [CrossRef] [PubMed]
[7] Wagner, D., Schneier, B., et al. (1996) Analysis of the SSL 3.0 Protocol. The Second USENIX Workshop on Electronic Commerce Proceedings, California, 18-21 November 1996, 29-40.
[8] Wright, C.V., Coull, S.E. and Monrose, F. (2009) Traffic Morphing: An Efficient Defense against Statistical Traffic Analysis.
https://www.ndss-symposium.org/wp-content/uploads/2017/09/wright.pdf
[9] 邹鸿程, 苏金树, 魏子令, 等. 网站指纹识别与防御研究综述[J]. 计算机学报, 2022, 45(10): 2243-2278.
[10] Yarom, Y. and Falkner, K. (2014) FLUSH + RELOAD: A High Resolution, Low Noise, 13 Cache Side-Channe Attack. 23rd USENIX Security Symposium (USENIX Security 14), San Diego, 20-22 August 2014, 719-732.
[11] Lipp, M., Gruss, D., Schwarz, M., Bidner, D., Maurice, C. and Mangard, S. (2017) Practical Keystroke Timing Attacks in Sandboxed Javascript. In: Lecture Notes in Computer Science, Springer, 191-209. [Google Scholar] [CrossRef
[12] Gras, B., Razavi, K., Bosman, E., Bos, H. and Giuffrida, C. (2017) ASLR on the Line: Practical Cache Attacks on the MMU. Proceedings 2017 Network and Distributed System Security Symposium, Norway, 11-15 September 2017, 191-209. [Google Scholar] [CrossRef
[13] Clark, S.S., Mustafa, H., Ransford, B., Sorber, J., Fu, K. and Xu, W. (2013) Current Events: Identifying Webpages by Tapping the Electrical Outlet. In: Lecture Notes in Computer Science, Springer, 700-717. [Google Scholar] [CrossRef
[14] Shusterman, A., Kang, L., Haskal, Y., et al. (2019) Robust Website Fingerprinting through the Cache Occupancy Channel. 2019 USENIX Security, Santa Clara, 14-16 August 2019, 639-656.
[15] Cook, J., Drean, J., Behrens, J. and Yan, M. (2022) There’s Always a Bigger Fish. Proceedings of the 49th Annual International Symposium on Computer Architecture, New York, 18-22 June 2022, 204-217. [Google Scholar] [CrossRef
[16] Zhang, R., Kim,T., Weber, D., et al. (2023) Wait for It: Bridging the Gap between Microarchitectural and Architectural Side Channels. 2023 USENIX Security, Anaheim, 9-11 August 2023, 7267-7284.
[17] Intel Corporation (2020) Intel CVE-2020-8694.
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00389.html
[18] AMD Corporation (2020) AMDCVE-2020-12912.
https://nvd.nist.gov/vuln/detail/CVE-2020-12912
[19] Cai, X., Zhang, X.C., Joshi, B. and Johnson, R. (2012) Touching from a Distance. Proceedings of the 2012 ACM Conference on Computer and Communications Security, New York, 16-18 October 2012, 605-616. [Google Scholar] [CrossRef
[20] Liberatore, M. and Levine, B.N. (2006) Inferring the Source of Encrypted HTTP Connections. Proceedings of the 13th ACM Conference on Computer and Communications Security, New York, 30 October-3 November 2006, 255-263. [Google Scholar] [CrossRef
[21] Hintz, A. (2003) Fingerprinting Websites Using Traffic Analysis. In: Lecture Notes in Computer Science, Springer, 171-178. [Google Scholar] [CrossRef
[22] Shi, Y. and Matsuura, K. (2009) Fingerprinting Attack on the Tor Anonymity System. In: Lecture Notes in Computer Science, Springer, 425-438. [Google Scholar] [CrossRef
[23] Lu, L., Chang, E. and Chan, M.C. (2010) Website Fingerprinting and Identification Using Ordered Feature Sequences. In: Lecture Notes in Computer Science, Springer, 199-214. [Google Scholar] [CrossRef
[24] Bissias, G.D., Liberatore, M., Jensen, D. and Levine, B.N. (2006) Privacy Vulnerabilities in Encrypted HTTP Streams. In: Lecture Notes in Computer Science, Springer, 1-11. [Google Scholar] [CrossRef
[25] Qasem, A., Zhioua, S. and Makhlouf, K. (2019) Finding a Needle in a Haystack: The Traffic Analysis Version. Proceedings on Privacy Enhancing Technologies, 2019, 270-290. [Google Scholar] [CrossRef
[26] Rish, I., et al. (2001) An Empirical Study of the Naive Bayes Classifier. IJCAI 2001 Workshop on Empirical Methods in Artificial Intelligence, Seattle, 4 August 2001, 41-46.
[27] Chang, C. and Lin, C. (2011) LIBSVM: A Library for Support Vector Machines. ACM Transactions on Intelligent Systems and Technology, 2, 1-27. [Google Scholar] [CrossRef
[28] Cai, X. (2014) Website Fingerprinting Attacks and Defenses on Anonymity Networks. State University of New York at Stony Brook.
[29] Hinton, G.E., Osindero, S. and Teh, Y. (2006) A Fast Learning Algorithm for Deep Belief Nets. Neural Computation, 18, 1527-1554. [Google Scholar] [CrossRef] [PubMed]
[30] Rimmer, V., Preuveneers, D., Juarez, M., Goethem, T.V. and Joosen, W. (2018) Automated Website Fingerprinting through Deep Learning. Proceedings 2018 Network and Distributed System Security Symposium, San Diego, 18-21 February 2018, Article 23150. [Google Scholar] [CrossRef
[31] Sirinam, P., Imani, M., Juarez, M. and Wright, M. (2018) Deep Fingerprinting. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, New York, 15-19 October 2018, 1928-1943. [Google Scholar] [CrossRef
[32] Pan, T., Tang, Z. and Xu, D. (2023) A Practical Website Fingerprinting Attack via CNN-Based Transfer Learning. Mathematics, 11, Article 4078. [Google Scholar] [CrossRef
[33] Zou, H., Wei, Z., Su, J., Chen, S. and Qin, Z. (2024) Relation-CNN: Enhancing Website Fingerprinting Attack with Relation Features and NFS-CNN. Expert Systems with Applications, 247, Article 123236. [Google Scholar] [CrossRef
[34] Qiao, L., Wu, B., Yin, S., Li, H., Yuan, W. and Luo, X. (2023) Resisting DNN-Based Website Fingerprinting Attacks Enhanced by Adversarial Training. IEEE Transactions on Information Forensics and Security, 18, 5375-5386. [Google Scholar] [CrossRef
[35] Deng, X., Yin, Q., Liu, Z., Zhao, X., Li, Q., Xu, M., et al. (2023) Robust Multi-Tab Website Fingerprinting Attacks in the Wild. 2023 IEEE Symposium on Security and Privacy, San Francisco, 21-25 May 2023, 1005-1022. [Google Scholar] [CrossRef
[36] Chen, G., Chen, S., Xiao, Y., Zhang, Y., Lin, Z. and Lai, T. (2020) Sgxpectre: Stealing Intel Secrets from SGX Enclaves via Speculative Execution. IEEE Security & Privacy, 18, 28-37. [Google Scholar] [CrossRef
[37] Shusterman, A., Agarwal, A., O’Connell, S., et al. (2021) Prime+Probe 1, JavaScript 0: Overcoming Browser-Based Side-Channel Defenses. 2021 USENIX Security, Online, 11-13 August 2021, 2863-2880.
[38] Cronin, P., Gao, X., Wang, H. and Cotton, C. (2021) An Exploration of ARM System-Level Cache and GPU Side Channels. Annual Computer Security Applications Conference, New York, 6-10 December 2021, 784-795. [Google Scholar] [CrossRef
[39] Taneja, H., Kim, J., Xu, J.J., et al. (2023) Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs. 2023 USENIX Security, Anaheim, 9-11 August 2023, 6275-6292.
[40] Rauscher, F., Kogler, A., Juffinger, J. and Gruss, D. (2024) Idleleak: Exploiting Idle State Side Effects for Information Leakage. Proceedings 2024 Network and Distributed System Security Symposium, San Diego, 26 February-1 March 2024. [Google Scholar] [CrossRef
[41] Agarwal, A., O’Connell, S., Kim, J., Yehezkel, S., Genkin, D., Ronen, E., et al. (2022). Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution. 2022 IEEE Symposium on Security and Privacy (SP), San Francisco, 22-26 May 2022, 699-715. [CrossRef
[42] Paccagnella, R., Luo, L. and Fletcher, C.W. (2021) Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical.
[43] Gulmezoglu, B. (2022) Xai-Based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses. IEEE Transactions on Dependable and Secure Computing, 19, 4039-4051. [Google Scholar] [CrossRef
[44] Ge, Q., Yarom, Y., Chothia, T. and Heiser, G. (2019) Time Protection. Proceedings of the Fourteenth EuroSys Conference 2019, New York, 25-28 March 2019, 1-17. [Google Scholar] [CrossRef