Главная
Study mode:
on
1
Intro
2
Do You Care About your Geo-location?
3
Sources of Users' Geo-locations
4
Problem Statement
5
Background: Browser Cache
6
Directives in Response Headers to Control Cache
7
Browser Cache Stores Static Resources
8
Benefits of Browser Cache
9
Attack Vector (11) : Measuring Page Load Time
10
Time of XMLHttpRequests
11
Attack Vector (IV): Use img complete Property
12
How to Infer a User's City?
13
Evaluation Setup
14
Loading Time: Without Cache.s. With Cachel
15
Private Browsing Mode is not the Cure
16
Randomizing Timing Measurements
17
TorBrowser is not Perfect
18
Segregating Browser Cache
19
Take-away
Description:
Explore geo-inference attacks via browser cache in this Black Hat conference talk. Delve into how websites customizing services based on user location can inadvertently leak sensitive geo-location information. Examine the widespread vulnerability affecting 62% of Alexa Top 100 websites and 11 map service sites. Learn about timing side-channel attacks that can pinpoint users' countries, cities, and neighborhoods. Discover the impact on major browsers, including Chrome, Firefox, and TorBrowser. Investigate existing defenses, their effectiveness, and additional measures needed for improved protection. Gain insights into browser cache mechanics, attack vectors, evaluation methods, and potential countermeasures. Understand the implications of geo-location leakage for user privacy and web application security.

I Know Where You've Been - Geo-Inference Attacks Via The Browser Cache

Black Hat
Add to list
0:00 / 0:00