A Browser Fingerprint Authentication Scheme Based on the Browser Cache Side-Channel Technology
Abstract
:1. Introduction
- We propose a more stable and secure browser fingerprint authentication scheme that integrates browser cache side-channel technology, therefore mitigating phishing attacks.
- We introduce the timestamp to identify man-in-the-middle (MITM) attacks by analyzing the duration of fingerprint collection.
- We test and analyze the uniqueness and stability of browser cache side-channel data across 11 different computer devices. Furthermore, the accuracy of the proposed authentication scheme is tested, with experimental results indicating a recall rate of 96.17% even in the presence of man-in-the-middle and phishing attacks.
2. Background and Related Work
2.1. Browser Cache Side-Channel Technology
- Prime Phase: the attacker fills the CPU cache with specific data carefully selected to impact the cache’s behavior in subsequent operations.
- Wait Phase: victims execute operations that may replace the data previously loaded by attackers in the cache.
- Probe Phase: the attacker performs memory access operations and observes the timing or latency of these operations. By carefully timing memory accesses, the attacker can infer information about the cache state and potentially recover sensitive data.
2.2. Browser Fingerprint Authentication Technology
3. Problem Statement
3.1. System Models
3.2. Threat Models
3.2.1. Phishing Attacks
3.2.2. Man-in-the-Middle Attack
3.3. Design Goals
- Uniqueness: A secure browser fingerprint authentication scheme demonstrates uniqueness if the cache side-channel data from different devices exhibit distinct characteristics from each other.
- Stability: A secure browser fingerprint authentication scheme holds stability if the cache side-channel data from one device remains highly consistent over time.
- Phishing attack resistance: A secure browser fingerprint authentication scheme exhibits resistance to phishing attacks if it can identify an attacker who fraudulently obtains users’ browser fingerprint data under the guise of a legitimate entity or service.
- Man-in-the-middle attack resistance: A secure browser fingerprint authentication scheme demonstrates resistance to man-in-the-middle attacks if it can detect an attacker who intercepts communication between two parties without their knowledge.
4. Scheme Design
4.1. Data Collection
4.2. Data Processing
- Mean ComputationWe convert the cache side-channel data , , and B into one-dimensional vectors , , and according to the following equation:
- Complex FormulationSubsequently, we apply Equation (3) to convert the elements within the vectors , , and into complex numbers, and pad their length to the smallest power of 2.
- Fast Fourier TransformFFT is an efficient algorithm to execute the Discrete Fourier Transform (DFT). It is a mathematical operation that transforms data from the time domain into a representation in the frequency domain. It can effectively analyze the frequency domain features of the data and help identify the similarity between two sets of data. We apply the FFT algorithm, as shown in Algorithm 1, to convert the vector to a vector F representing data in the frequency domain. Initially, the elements in the vector are divided into two parts: elements with even indexes and elements with odd indexes. Subsequently, F is computed by recursively performing the Fourier transform based on these two parts. During this process, the butterfly operation is employed to reduce the overall computational effort by combining smaller Fourier transforms into larger ones through recursion.
Algorithm 1 FFT - 1:
- Input:
- 2:
- Output: F
- 3:
- 4:
- if then
- 5:
- return
- 6:
- end if
- 7:
- ▹ elements of with even indexes
- 8:
- ▹ elements of with odd indexes
- 9:
- for k from 1 to do ▹ Perform the butterfly operation
- 10:
- ▹ Calculate the rotation factor
- 11:
- 12:
- 13:
- end for
- 14:
- return
- Correlation analysisAccording to Equation (4), we utilize the convolution theorem in the frequency domain to compute the correlation between data and , and between data and B, respectively. FFT*() denotes the covariance result after the Fast Fourier Transform, and IFFT() denotes the Inverse Fast Fourier Transform.The IFFT algorithm is the inverse operation of the Fast Fourier Transform. As shown in Algorithm 2, it transforms the product of browser cache side-channel data and in the frequency domain (denoted by and , respectively) to a vector R representing a list of correlations between and . The process begins by determining the length of the arrays. Each element of is then multiplied by the conjugate of the corresponding element in , with the results stored in a temporary array . This temporary array is subsequently conjugated and transformed using the FFT algorithm. The resulting array, , is again conjugated, and both its real and imaginary parts are normalized by dividing by the array length. The final result, R, represents the correlations between the original data sets in the time domain.
Algorithm 2 IFFT - 1:
- Input:
- 2:
- Output: R
- 3:
- 4:
- for j from 1 to l do ▹ Multiply each element of by the conjugate
- 5:
- of the corresponding element
- 6:
- ▹ Conjugate operation
- 7:
- 8:
- end for
- 9:
- for j from 1 to l do
- 10:
- 11:
- end for
- 12:
- 13:
- for j from 1 to l do
- 14:
- 15:
- ▹ the real part of
- 16:
- ▹ the imaginary part of
- 17:
- end for
- 18:
- return
4.3. Browser Fingerprint Generation
Algorithm 3 BFG |
|
4.4. Timestamp Analysis
5. Security and Privacy Analysis
5.1. Security Analysis
5.1.1. Resistance to Man-in-the-Middle Attacks
- IP redirectionThe attacker attempts to achieve unauthorized login by altering the IP address upon receiving data from victims. In this case, the duration of fingerprint collection is represented as , where denotes the time of receiving data when encountering man-in-the-middle attacks. As shown in Figure 6, the process by which attackers alter IP addresses extends the duration of fingerprint collection, ultimately falling outside the normal range.
- Timestamp ModificationAdditionally, the attacker may attempt to manipulate the completion time of the browser cache side-channel data collection () to ensure that the overall duration of data collection appears normal. As shown in Figure 7, according to Equation (7), executing this attack requires the attacker to simultaneously know the start time of data collection (), , and . However, and are collected only on the server side, which is a trusted entity. Additionally, is not collected during the entire communication process. Therefore, this scheme effectively mitigates man-in-the-middle attacks involving timestamp modification.
5.1.2. Resistance to Phishing Attacks
5.2. Privacy Analysis
6. Evaluation
6.1. Computation Overhead
6.2. Uniqueness Test
6.3. Stability Test
6.4. Accuracy Test
- Recall Rate (): The proportion of legitimate users judged to be legitimate users.
- False Acceptance Rate (): The proportion of illegal users judged to be legitimate users.
- False Rejection Rate (): The proportion of legitimate users judged to be illegitimate users.
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Rock, L.Y.; Tajudeen, F.P.; Chung, Y.W. Usage and impact of the internet-of-things-based smart home technology: A quality-of-life perspective. Univers. Access Inf. Soc. 2024, 23, 345–364. [Google Scholar] [CrossRef] [PubMed]
- Laperdrix, P.; Bielova, N.; Baudry, B.; Avoine, G. Browser fingerprinting: A survey. ACM Trans. Web (TWEB) 2020, 14, 1–33. [Google Scholar] [CrossRef]
- Laperdrix, P.; Rudametkin, W.; Baudry, B. Beauty and the beast: Diverting modern web browsers to build unique browser fingerprints. In Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–26 May 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 878–894. [Google Scholar]
- DiMaggio, P.; Hargittai, E.; Neuman, W.R.; Robinson, J.P. Social implications of the Internet. Annu. Rev. Sociol. 2001, 27, 307–336. [Google Scholar] [CrossRef]
- Ross, B.; Jackson, C.; Miyake, N.; Boneh, D.; Mitchell, J.C. Stronger Password Authentication Using Browser Extensions. In Proceedings of the USENIX Security Symposium, Baltimore, MD, USA, 31 July–5 August 2005; Volume 17, p. 32. [Google Scholar]
- Laperdrix, P.; Avoine, G.; Baudry, B.; Nikiforakis, N. Morellian analysis for browsers: Making web authentication stronger with canvas fingerprinting. In Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment: 16th International Conference, DIMVA 2019, Gothenburg, Sweden, 19–20 June 2019; Proceedings 16. Springer: Berlin/Heidelberg, Germany, 2019; pp. 43–66. [Google Scholar]
- Al Kabir, M.A.; Elmedany, W. Adaptive Risk-Based Passwordless Authentication: A Fido2 Integrated Approach for Enhanced Security and Usability. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4795401 (accessed on 9 July 2024).
- Tyagi, V.; Saraswat, A.; Bansal, S. An Analysis of Securing Internet of Things (IoT) Devices from Man-in-the-Middle (MIMA) and Denial of Service (DoS). In Smart Cities; CRC Press: Boca Raton, FL, USA, 2023; pp. 337–357. [Google Scholar]
- Andriamilanto, N.; Allard, T.; Le Guelvouit, G. FPSelect: Low-cost browser fingerprints for mitigating dictionary attacks against web authentication mechanisms. In Proceedings of the 36th Annual Computer Security Applications Conference, Virtual, 7–11 December 2020; pp. 627–642. [Google Scholar]
- Otta, S.P.; Panda, S.; Gupta, M.; Hota, C. A systematic survey of multi-factor authentication for cloud infrastructure. Future Internet 2023, 15, 146. [Google Scholar] [CrossRef]
- Mohammed, A.H.Y.; Dziyauddin, R.A.; Latiff, L.A. Current multi-factor of authentication: Approaches, requirements, attacks and challenges. Int. J. Adv. Comput. Sci. Appl. 2023, 14, 166–177. [Google Scholar] [CrossRef]
- Gómez-Boix, A.; Laperdrix, P.; Baudry, B. Hiding in the crowd: An analysis of the effectiveness of browser fingerprinting at large scale. In Proceedings of the 2018 World Wide Web Conference, Lyon, France, 23–27 April 2018; pp. 309–318. [Google Scholar]
- Upathilake, R.; Li, Y.; Matrawy, A. A classification of web browser fingerprinting techniques. In Proceedings of the 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 27–29 July 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 1–5. [Google Scholar]
- Durey, A.; Laperdrix, P.; Rudametkin, W.; Rouvoy, R. FP-Redemption: Studying browser fingerprinting adoption for the sake of web security. In Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment: 18th International Conference, DIMVA 2021, Virtual Event, 14–16 July 2021; Proceedings 18. Springer: Berlin/Heidelberg, Germany, 2021; pp. 237–257. [Google Scholar]
- Andriamilanto, N.; Allard, T.; Guelvouit, G.L. “Guess Who?” Large-scale data-centric study of the adequacy of browser fingerprints for web authentication. In Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing: Proceedings of the 14th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2020), Lodz, Poland, 1–3 July 2020; Springer: Berlin/Heidelberg, Germany, 2021; pp. 161–172. [Google Scholar]
- Eckersley, P. How unique is your web browser? In Proceedings of the Privacy Enhancing Technologies: 10th International Symposium, PETS 2010, Berlin, Germany, 21–23 July 2010; Proceedings 10. Springer: Berlin/Heidelberg, Germany, 2010; pp. 1–18. [Google Scholar]
- Bursztein, E.; Benko, B.; Margolis, D.; Pietraszek, T.; Archer, A.; Aquino, A.; Pitsillidis, A.; Savage, S. Handcrafted fraud and extortion: Manual account hijacking in the wild. In Proceedings of the 2014 Conference on Internet Measurement Conference, Vancouver, BC, Canada, 5–7 November 2014; pp. 347–358. [Google Scholar]
- Sanchez-Rola, I.; Bilge, L.; Balzarotti, D.; Buescher, A.; Efstathopoulos, P. Rods with laser beams: Understanding browser fingerprinting on phishing pages. In Proceedings of the 32nd USENIX Security Symposium (USENIX Security 23), Anaheim, CA, USA, 9–11 August 2023; pp. 4157–4173. [Google Scholar]
- Zaheri, M.; Oren, Y.; Curtmola, R. Targeted deanonymization via the cache side channel: Attacks and defenses. In Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), Boston, MA, USA, 10–12 August 2022; pp. 1505–1523. [Google Scholar]
- Ge, Q.; Yarom, Y.; Cock, D.; Heiser, G. A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. J. Cryptogr. Eng. 2018, 8, 1–27. [Google Scholar] [CrossRef]
- Bazm, M.M.; Sautereau, T.; Lacoste, M.; Sudholt, M.; Menaud, J.M. Cache-based side-channel attacks detection through intel cache monitoring technology and hardware performance counters. In Proceedings of the 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC), Barcelona, Spain, 23–26 April 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 7–12. [Google Scholar]
- Randolph, M.; Diehl, W. Power side-channel attack analysis: A review of 20 years of study for the layman. Cryptography 2020, 4, 15. [Google Scholar] [CrossRef]
- Standaert, F.X. Introduction to side-channel attacks. In Secure Integrated Circuits and Systems; Springer: Berlin/Heidelberg, Germany, 2010; pp. 27–42. [Google Scholar]
- Gruss, D.; Maurice, C.; Wagner, K.; Mangard, S. Flush+ Flush: A fast and stealthy cache attack. In Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, 7–8 July 2016; Proceedings 13. Springer: Berlin/Heidelberg, Germany, 2016; pp. 279–299. [Google Scholar]
- Osvik, D.A.; Shamir, A.; Tromer, E. Cache attacks and countermeasures: The case of AES. In Proceedings of the Topics in Cryptology—CT-RSA 2006: The Cryptographers’ Track at the RSA Conference 2006, San Jose, CA, USA, 13–17 February 2005; Proceedings. Springer: Berlin/Heidelberg, Germany, 2006; pp. 1–20. [Google Scholar]
- Shusterman, A.; Avraham, Z.; Croitoru, E.; Haskal, Y.; Kang, L.; Levi, D.; Meltser, Y.; Mittal, P.; Oren, Y.; Yarom, Y. Website fingerprinting through the cache occupancy channel and its real world practicality. IEEE Trans. Dependable Secur. Comput. 2020, 18, 2042–2060. [Google Scholar] [CrossRef]
- Cronin, P.; Gao, X.; Wang, H.; Cotton, C. An exploration of ARM system-level cache and GPU side channels. In Proceedings of the 37th Annual Computer Security Applications Conference, Virtual Conference, 6–10 December 2021; pp. 784–795. [Google Scholar]
- Andriamilanto, N.; Allard, T.; Le Guelvouit, G.; Garel, A. A large-scale empirical analysis of browser fingerprints properties for web authentication. ACM Trans. Web (TWEB) 2021, 16, 1–62. [Google Scholar] [CrossRef]
- Nikiforakis, N.; Kapravelos, A.; Joosen, W.; Kruegel, C.; Piessens, F.; Vigna, G. Cookieless monster: Exploring the ecosystem of web-based device fingerprinting. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 19–22 May 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 541–555. [Google Scholar]
- Queiroz, J.S.; Feitosa, E.L. A web browser fingerprinting method based on the web audio API. Comput. J. 2019, 62, 1106–1120. [Google Scholar] [CrossRef]
- Karami, S.; Ilia, P.; Solomos, K.; Polakis, J. Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting. In Proceedings of the 27th Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 23–26 February 2020. [Google Scholar]
- Stragapede, G.; Vera-Rodriguez, R.; Tolosana, R.; Morales, A.; Acien, A.; Le Lan, G. Mobile behavioral biometrics for passive authentication. Pattern Recognit. Lett. 2022, 157, 35–41. [Google Scholar] [CrossRef]
- Sánchez, P.M.S.; Valero, J.M.J.; Celdrán, A.H.; Bovet, G.; Pérez, M.G.; Pérez, G.M. A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets. IEEE Commun. Surv. Tutor. 2021, 23, 1048–1077. [Google Scholar] [CrossRef]
- Andriamilanto, N.; Allard, T. Brfast: A tool to select browser fingerprinting attributes for web authentication according to a usability-security trade-off. In Proceedings of the Companion Proceedings of the Web Conference 2021, Ljubljana, Slovenia, 19–23 April 2021; pp. 701–704. [Google Scholar]
- Lin, X.; Ilia, P.; Solanki, S.; Polakis, J. Phish in sheep’s clothing: Exploring the authentication pitfalls of browser fingerprinting. In Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), Boston, MA, USA, 10–12 August 2022; pp. 1651–1668. [Google Scholar]
- Alkhalil, Z.; Hewage, C.; Nawaf, L.; Khan, I. Phishing attacks: A recent comprehensive study and a new anatomy. Front. Comput. Sci. 2021, 3, 563060. [Google Scholar] [CrossRef]
- Alabdan, R. Phishing attacks survey: Types, vectors, and technical approaches. Future Internet 2020, 12, 168. [Google Scholar] [CrossRef]
- Gupta, B.B.; Tewari, A.; Jain, A.K.; Agrawal, D.P. Fighting against phishing attacks: State of the art and future challenges. Neural Comput. Appl. 2017, 28, 3629–3654. [Google Scholar] [CrossRef]
- Conti, M.; Dragoni, N.; Lesyk, V. A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 2016, 18, 2027–2051. [Google Scholar] [CrossRef]
- Callegati, F.; Cerroni, W.; Ramilli, M. Man-in-the-Middle Attack to the HTTPS Protocol. IEEE Secur. Priv. 2009, 7, 78–81. [Google Scholar] [CrossRef]
- Mallik, A. Man-in-the-middle-attack: Understanding in simple words. Cyberspace J. Pendidik. Teknol. Inf. 2019, 2, 109–134. [Google Scholar] [CrossRef]
- Alaca, F.; Van Oorschot, P.C. Device fingerprinting for augmenting web authentication: Classification and analysis of methods. In Proceedings of the 32nd Annual Conference on Computer Security Applications, Los Angeles, CA, USA, 5–9 December 2016; pp. 289–301. [Google Scholar]
- Cao, Y.; Li, S.; Wijmans, E. (Cross-) browser fingerprinting via OS and hardware level features. In Proceedings of the Proceedings 2017 Network and Distributed System Security Symposium. Internet Society, San Diego, CA, USA, 26 February–1 March 2017. [Google Scholar]
- Iqbal, U.; Englehardt, S.; Shafiq, Z. Fingerprinting the fingerprinters: Learning to detect browser fingerprinting behaviors. In Proceedings of the 2021 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 24–27 May 2020; IEEE: Piscataway, NJ, USA, 2021; pp. 1143–1161. [Google Scholar]
Notation | Explanation |
---|---|
X | A matrix with N rows and M columns. |
Two matrixes representing the browser cache side-channel data collected during user registration. | |
B | A matrix, representing the browser cache side-channel data collected during the subsequent login process. |
A one-dimensional vector, where each element is the average of the sum of all elements in the corresponding column of the matrix X. | |
A one-dimensional vector obtained by converting the elements of into complex numbers and padding its length to the smallest power of 2. | |
The correlation between and . |
Algorithm | Computation Complexity |
---|---|
FFT | |
IFFT | |
BFG |
Equipment Number | Device Type | Operating System Type | CPU Model | RAM Model |
---|---|---|---|---|
Device 1 | Desktop computer | Windows10 | Intel Core i3-10100 | 8 GB |
Device 2 | Desktop computer | Windows10 | Intel Core i3-10105T | 8 GB |
Device 3 | Desktop computer | Windows10 | Intel Core i5-10400 | 32 GB |
Device 4 | Notebook computer | Windows11 | Intel Core i5-9300HF | 16 GB |
Device 5 | Notebook computer | Windows11 | Intel Core i7-8550U | 16 GB |
Device 6 | Desktop computer | Windows10 | Intel Core i7 | 24 GB |
Device 7 | Notebook computer | Windows10 | Intel Core i7 | 32 GB |
Device 8 | Notebook computer | Windows10 | Intel Core i7-12700H | 16 GB |
Device 9 | Notebook computer | Windows10 | Intel Core i9 | 16 GB |
Device 10 | Notebook computer | Windows10 | Intel Core i9-12900H | 32 GB |
Device 11 | Notebook computer | Windows10 | Intel Core i9-13900HX | 32 GB |
Group Number | Attacker | Victim | K = 2 | K = 3 | ||||
---|---|---|---|---|---|---|---|---|
/% | /% | /% | /% | /% | /% | |||
1 | Device 7 | Device 4 | 99.67 | 0 | 0.33 | 99.67 | 0.33 | 0.33 |
2 | Device 2 | Device 3 | 85 | 0 | 15 | 97.31 | 12.31 | 2.69 |
3 | Device 1 | Device 2 | 100 | 0 | 0 | 100 | 0 | 0 |
4 | Device 11 | Device 4 | 86.69 | 0 | 13.31 | 92.45 | 4.68 | 7.55 |
5 | Device 8 | Device 10 | 90.68 | 0 | 9.32 | 95.34 | 5.4 | 4.66 |
6 | Device 2 | Device 8 | 98.67 | 0 | 1.33 | 99 | 0.33 | 1 |
7 | Device 4 | Device 7 | 99 | 0 | 1 | 99.67 | 0.72 | 0.33 |
8 | Device 11 | Device 7 | 61.67 | 0 | 38.33 | 84.67 | 24 | 15.33 |
9 | Device 9 | Device 1 | 98.67 | 0 | 1.33 | 98.67 | 0.33 | 1.33 |
10 | Device 9 | Device 4 | 98.67 | 0 | 1.33 | 98.67 | 0 | 1.33 |
11 | Device 7 | Device 5 | 100 | 0 | 0 | 100 | 0.33 | 0 |
12 | Device 2 | Device 10 | 100 | 0 | 0 | 100 | 0 | 0 |
13 | Device 2 | Device 5 | 71.91 | 0 | 28.09 | 85.58 | 12.59 | 14.42 |
14 | Device 11 | Device 5 | 96.4 | 0 | 3.6 | 98.56 | 2 | 1.44 |
15 | Device 10 | Device 9 | 86.67 | 0 | 13.33 | 93 | 7 | 7 |
Average value | 91.58 | 0 | 8.42 | 96.17 | 4.67 | 3.83 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yan, Y.; Zhao, H.; Qu, H. A Browser Fingerprint Authentication Scheme Based on the Browser Cache Side-Channel Technology. Electronics 2024, 13, 2728. https://doi.org/10.3390/electronics13142728
Yan Y, Zhao H, Qu H. A Browser Fingerprint Authentication Scheme Based on the Browser Cache Side-Channel Technology. Electronics. 2024; 13(14):2728. https://doi.org/10.3390/electronics13142728
Chicago/Turabian StyleYan, Yiming, Haiyong Zhao, and Haipeng Qu. 2024. "A Browser Fingerprint Authentication Scheme Based on the Browser Cache Side-Channel Technology" Electronics 13, no. 14: 2728. https://doi.org/10.3390/electronics13142728
APA StyleYan, Y., Zhao, H., & Qu, H. (2024). A Browser Fingerprint Authentication Scheme Based on the Browser Cache Side-Channel Technology. Electronics, 13(14), 2728. https://doi.org/10.3390/electronics13142728