Toward exposing timing-based probing attacks in web applications

3Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Timing attacks in web applications have been known for over a decade. Recently, new attacks have been reported to exploit timing techniques to probe sensitive information from web applications. In this paper, we present a tool to detect timing-based probing attacks in web applications. The main idea of our approach is to monitor the browser behaviors and identify anomalous timing behaviors. We prototyped our approach in the Google Chrome browser, and demonstrated its effectiveness.

Cite

CITATION STYLE

APA

Mao, J., Chen, Y., Shi, F., Jia, Y., & Liang, Z. (2016). Toward exposing timing-based probing attacks in web applications. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9798 LNCS, pp. 499–510). Springer Verlag. https://doi.org/10.1007/978-3-319-42836-9_44

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free