Nothing Special   »   [go: up one dir, main page]

Sanchez-Rola et al., 2019 - Google Patents

Bakingtimer: privacy analysis of server-side request processing time

Sanchez-Rola et al., 2019

View PDF
Document ID
16683317456233026458
Author
Sanchez-Rola I
Balzarotti D
Santos I
Publication year
Publication venue
Proceedings of the 35th Annual Computer Security Applications Conference

External Links

Snippet

Cookies were originally introduced as a way to provide state awareness to websites, and are now one of the backbones of the current web. However, their use is not limited to store the login information or to save the current state of user browsing. In several cases, third …
Continue reading at www.nortonlifelock.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3409Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
    • G06F11/3414Workload generation, e.g. scripts, playback
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/875Monitoring of systems including the internet
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30873Retrieval from the Internet, e.g. browsers by navigation, e.g. using categorized browsing, portals, synchronized browsing, visual networks of documents, virtual worlds or tours
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
Van Goethem et al. The clock is still ticking: Timing attacks in the modern web
Hong et al. How you get shot in the back: A systematical study about cryptojacking in the real world
Mehnaz et al. Are your sensitive attributes private? novel model inversion attribute inference attacks on classification models
Acar et al. The web never forgets: Persistent tracking mechanisms in the wild
Nikiforakis et al. You are what you include: large-scale evaluation of remote javascript inclusions
Franken et al. Who Left Open the Cookie Jar? A Comprehensive Evaluation of {Third-Party} Cookie Policies
Yan et al. Rolling colors: Adversarial laser exploits against traffic light recognition
US8850567B1 (en) Unauthorized URL requests detection
Sanchez-Rola et al. Bakingtimer: privacy analysis of server-side request processing time
US20200213333A1 (en) Detection of remote fraudulent activity in a client-server-system
Cassel et al. Omnicrawl: Comprehensive measurement of web tracking with real desktop and mobile browsers
Karaj et al. WhoTracks. Me: Shedding light on the opaque world of online tracking
Bujlow et al. Web tracking: Mechanisms, implications, and defenses
RU2697950C2 (en) System and method of detecting latent behaviour of browser extension
Kaur et al. Browser fingerprinting as user tracking technology
Kim et al. Inferring browser activity and status through remote monitoring of storage usage
Sanchez-Rola et al. Cookies from the past: Timing server-side request processing code for history sniffing
Mishra et al. Intelligent phishing detection system using similarity matching algorithms
Durey et al. FP-Redemption: Studying browser fingerprinting adoption for the sake of web security
US11303670B1 (en) Pre-filtering detection of an injected script on a webpage accessed by a computing device
Urban et al. Towards understanding privacy implications of adware and potentially unwanted programs
Munir et al. Cookiegraph: Understanding and detecting first-party tracking cookies
Zhang et al. A survey of browser fingerprint research and application
Zaheri et al. Targeted deanonymization via the cache side channel: Attacks and defenses
Criscione et al. ZARATHUSTRA: Extracting Webinject signatures from banking trojans