2021
DOI: 10.48550/arxiv.2112.06324
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Pool-Party: Exploiting Browser Resource Pools as Side-Channels for Web Tracking

Abstract: We identify a new class of side-channels in browsers that are not mitigated by current defenses. This class of sidechannels, which we call "pool-party" attacks, allow sites to create covert channels by manipulating limited-but-unpartitioned resource pools in browsers. We identify pool-party attacks in all popular browsers, and show they are practical cross-site tracking techniques.In this paper we make the following contributions: first, we describe pool-party side-channel attacks that exploit limits in applic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 19 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?