Go to file
Peter Deutsch 8856aecc78
Update worker.js
2023-02-06 12:45:10 -05:00
part1 Update warmup.js 2023-02-06 12:43:32 -05:00
part2 Update eval.py 2023-02-06 12:44:41 -05:00
part3 Update worker.js 2023-02-06 12:45:10 -05:00
part4 Initial fingerprinting lab commit 2023-01-31 15:06:27 -05:00
LICENSE Initial fingerprinting lab commit 2023-01-31 15:06:27 -05:00
README.md Initial fingerprinting lab commit 2023-01-31 15:06:27 -05:00
automate.py Initial fingerprinting lab commit 2023-01-31 15:06:27 -05:00
index.html Initial fingerprinting lab commit 2023-01-31 15:06:27 -05:00
update.sh Initial fingerprinting lab commit 2023-01-31 15:06:27 -05:00

README.md

Website Fingerprinting Lab

Learning Objectives

  • Explore a new kind of side channel from a high level language.
  • Understand how to reason about the root cause of misleading microarchitectural observations.
  • Develop a real-world website fingerprinting attack that works on modern browsers.

Description In this lab, students implement the techniques from our group's ISCA 2022 paper There's Always a Bigger Fish: A Case Study of a Misunderstood Timing Side Channel. Students will begin by implementing a seemingly familiar cache-based side channel attack in Javascript, and will then be asked to reason about why this attack works. Then, students will remove a core part of the attack, but see that the code still works.

Setup Students can complete this lab on their own machines. MacOS, Linux, Windows all should work. Google Chrome is required for Part 4 of this lab.