Trusted Browsers for Uncertain Times

David Kohlbrenner and Hovav Shacham.

In Proceedings of USENIX Security 2016, pages 463–80. USENIX, Aug. 2016.

Abstract

JavaScript in one origin can use timing channels in browsers to learn sensitive information about a user’s interaction with other origins, violating the browser’s compartmentalization guarantees. Browser vendors have attempted to close timing channels by trying to rewrite sensitive code to run in constant time and by reducing the resolution of reference clocks.

We argue that these ad-hoc efforts are unlikely to succeed. We show techniques that increase the effective resolution of degraded clocks by two orders of magnitude, and we present and evaluate multiple, new implicit clocks: techniques by which JavaScript can time events without consulting an explicit clock at all.

We show how “fuzzy time” ideas in the trusted operating systems literature can be adapted to building trusted browsers, degrading all clocks and reducing the bandwidth of all timing channels. We describe the design of a next-generation browser, called Fermata, in which all timing sources are completely mediated. As a proof of feasibility, we present Fuzzyfox, a fork of the Firefox browser that implements many of the Fermata principles within the constraints of today’s browser architecture. We show that Fuzzyfox achieves sufficient compatibility and performance for deployment today by privacy-sensitive users.

In summary:

Material

Reference

@InProceedings{KS16, author = {David Kohlbrenner and Hovav Shacham}, title = {Trusted Browsers for Uncertain Times}, booktitle = {Proceedings of USENIX Security 2016}, pages = {463-80}, year = 2016, editor = {Thorsten Holz and Stefan Savage}, month = aug, organization = {USENIX} }

Navigation: Hovav Shacham // Publications // [KS16]