Depending on HTTP/2 for Privacy? Good Luck!

被引:3
作者
Mitra, Gargi [1 ]
Vairam, Prasanna Karthik [1 ]
Slpsk, Patanjali [1 ]
Chandrachoodan, Nitin [2 ]
Kamakoti, V [1 ]
机构
[1] IIT Madras, Dept CSE, Chennai, Tamil Nadu, India
[2] IIT Madras, Dept EE, Chennai, Tamil Nadu, India
来源
2020 50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2020) | 2020年
关键词
HTTP/2; attack; privacy; encrypted traffic analysis;
D O I
10.1109/DSN48063.2020.00044
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
HTTP/2 introduced multi-threaded server operation for performance improvement over HTTP/1.1. Recent works have discovered that multi-threaded operation results in multiplexed object transmission, that can also have an unanticipated positive effect on TLS/SSL privacy. In fact, these works go on to design privacy schemes that rely heavily on multiplexing to obfuscate the sizes of the objects based on which the attackers inferred sensitive information. Orthogonal to these works, we examine if the privacy offered by such schemes work in practice. In this work, we show that it is possible for a network adversary with modest capabilities to completely break the privacy offered by the schemes that leverage HTTP/2 multiplexing. Our adversary works based on the following intuition: restricting only one HTTP/2 object to be in the server queue at any point of time will eliminate multiplexing of that object and any privacy benefit thereof. In our scheme, we begin by studying if (1) packet delays, (2) network jitter, (3) bandwidth limitation, and (4) targeted packet drops have an impact on the number of HTTP/2 objects processed by the server at an instant of time. Based on these insights, we design our adversary that forces the server to serialize object transmissions, thereby completing the attack. Our adversary was able to break the privacy of a real-world HTTP/2 website 90% of the time, the code for which will be released. To the best of our knowledge, this is the first privacy attack on HTTP/2.
引用
收藏
页码:278 / 285
页数:8
相关论文
共 24 条
[1]  
Al-Naami K., 2019, P IEEE T DEP SEC COM
[2]  
[Anonymous], 2020, SHODAN
[3]  
[Anonymous], 2020, TOR
[4]  
[Anonymous], 1998, TRAFFIC ANAL SSL ENC
[5]  
[Anonymous], 2020, FACEBOOK CAMBRIDGE A
[6]  
[Anonymous], 2020, ISIDEWITH
[7]   A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses [J].
Cai, Xiang ;
Nithyanand, Rishab ;
Wang, Tao ;
Johnson, Rob ;
Goldberg, Ian .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :227-238
[8]  
Chapman P, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P263
[9]   Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow [J].
Chen, Shuo ;
Wang, Rui ;
Wang, XiaoFeng ;
Zhang, Kehuan .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :191-206
[10]  
Coulthard M, 2017, INTRODUCTION TO FORENSIC LINGUISTICS: LANGUAGE IN EVIDENCE, 2ND EDITION, P9