Practical Memory Deduplication Attacks in Sandboxed Javascript
Description
Page deduplication is a mechanism to reduce the memory footprint of a system. Identical physical pages are identified across borders of virtual machines and programs and merged by the operating system or the hypervisor. However, this enables side-channel information leakage through cache or memory access time. Therefore, it is considered harmful in public clouds today, but it is still considered safe to use in a private environment, i.e., private clouds, personal computers, and smartphones.
We present the first memory-disclosure attack in sandboxed Javascript which exploits page deduplication. Unlike previous attacks, our attack does not require the victim to execute an adversary’s program, but simply to open a website which contains the adversary’s Javascript code. We are not only able to determine which applications are running, but also specific user activities, for instance, whether the user has specific websites currently opened. The attack works on servers, personal computers and smartphones, and across the borders of virtual machines.
Notes
Files
HECTOR-practical-memory-deduplication-attacks-2015.pdf
Files
(1.4 MB)
Name | Size | Download all |
---|---|---|
md5:7b7ba124c2f73f41271e379bbd555e53
|
1.4 MB | Preview Download |
Additional details
Related works
- Is part of
- 0302-9743 (ISSN)
- 10.1007/978-3-319-24174-6_6 (DOI)