DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection

39TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2023(2023)

引用 0|浏览0
暂无评分
摘要
Cache-based website fingerprinting (WF) attacks violate user privacy where the attacker leverages the shared last-level cache in CPUs and analyzes the fingerprints through machine learning and deep learning models. WF attacks are even applicable in Incognito and anonymized browser platforms, leading to a serious threat to the public. Several defense techniques inject random noise during website rendering to degrade the attack success rate, while these techniques either create large performance overhead or cannot obfuscate the WF dataset entirely when the attacker retrains a new learning model with noisy fingerprints. In this work, we develop a dynamic generative learning-based defense technique, DefWeb, to protect user privacy against cache-based WF attacks by injecting precise noise into the WFs. For this purpose, (i) we train generative neural networks to represent high-dimensional fingerprints in a low-dimension space while creating distinct clusters for each website. (ii) Minimal noise templates are extracted in the low-dimension space to obfuscate the fingerprints efficiently. (iii) We create practical noise templates that can be added to WFs during website rendering by leveraging self-modifying code (SMC). We implement DefWeb in both simulation and real-world setups to degrade the attacker's model accuracy. DefWeb can decrease the model accuracy to 1.1% and 28.8% in simulation and real-world setups, respectively, including Mozilla Firefox, Google Chrome, and Tor browsers. Finally, the performance overhead introduced by DefWeb is only 9.5%, which is considerably lower than previous defense techniques.
更多
查看译文
关键词
Cache-based Attack,Noise Injection,Website Fingerprinting,Generative Learning,Variational Autoencoder,Web Security
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要