Go to file
ClF3 868c83194e finished Website Fingerprinting Lab 2024-11-02 21:07:41 +08:00
part1 finished Website Fingerprinting Lab 2024-11-02 21:07:41 +08:00
part2 finished Website Fingerprinting Lab 2024-11-02 21:07:41 +08:00
part3 finished Website Fingerprinting Lab 2024-11-02 21:07:41 +08:00
LICENSE Initial fingerprinting lab commit 2023-01-31 15:06:27 -05:00
README.md 2024 release 2024-02-01 16:12:05 -05:00
automate.py Lab fixes for 2024 2023-08-16 19:19:15 -07:00
report.md 2024 release 2024-02-01 16:12:05 -05:00
traces.out finished Website Fingerprinting Lab 2024-11-02 21:07:41 +08:00
traces_4.out finished Website Fingerprinting Lab 2024-11-02 21:07:41 +08:00
traces_example.out finished Website Fingerprinting Lab 2024-11-02 21:07:41 +08:00
traces_nomem.out finished Website Fingerprinting Lab 2024-11-02 21:07:41 +08:00

README.md

Website Fingerprinting Lab

Learning Objectives

  • Explore a new kind of side channel from a high level language.
  • Understand how to reason about the root cause of misleading microarchitectural observations.
  • Develop a real-world website fingerprinting attack that works on modern browsers.

Description In this lab, students implement the techniques from our group's ISCA 2022 paper There's Always a Bigger Fish: A Case Study of a Misunderstood Timing Side Channel. Students will begin by implementing a seemingly familiar cache-based side channel attack in Javascript, and will then be asked to reason about why this attack works. Then, students will remove a core part of the attack, but see that the code still works.

Setup Students can complete this lab on their own machines. MacOS, Linux, Windows all should work.