sponsors
usenix conference policies
Tick Tock: Building Browser Red Pills from Timing Side Channels
Grant Ho and Dan Boneh, Stanford University; Lucas Ballard and Niels Provos, Google
Red pills allow programs to detect if their execution environment is a CPU emulator or a virtual machine. They are used by digital rights management systems and by malware authors. In this paper we study the possibility of browser-based red pills, namely red pills implemented as Javascript that runs in the browser and attempts to detect if the browser is running inside a virtual machine. These browser red pills can limit the effectiveness of Web malware scanners: scanners that detect drive-by downloads and other malicious content by crawling the Web using a browser in an emulated environment. We present multiple browser red pills that are robust across browser platforms and emulation technology. We also discuss potential mitigations thatWeb scanners can use to thwart some of these red pills.
Open Access Media
USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.
author = {Grant Ho and Dan Boneh and Lucas Ballard and Niels Provos},
title = {Tick Tock: Building Browser Red Pills from Timing Side Channels},
booktitle = {8th USENIX Workshop on Offensive Technologies (WOOT 14)},
year = {2014},
address = {San Diego, CA},
url = {https://www.usenix.org/conference/woot14/workshop-program/presentation/ho},
publisher = {USENIX Association},
month = aug
}
connect with us