Page 1 of 1

I2P protects you from SnailLoad (heise.de, study link inside)

Posted: Tue Jun 25, 2024 8:21 am
by lgillis
heise: The eavesdropping attack called SnailLoad only needs TCP/IP - neither malware nor security vulnerabilities. Every file downloaded from the internet has a typical latency pattern. This makes it possible to determine which video or website a user is accessing without any snooping software on the victim's device. […] Artificially added noise to the network connection can reduce the accuracy of the attack ...
heise Security

You can read the whole article on heise Security, and here is the link to the study "SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript" in English.

Re: I2P protects you from SnailLoad (heise.de, study link inside)

Posted: Wed Jun 26, 2024 4:58 am
by lgillis
Sharefile (I2P). Type: application/pdf, Size: 538.2 KB,
Link: http://sharefile.i2p/file/c5/c5340a4d04 ... ilload.pdf
SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript
Stefan Gast, Roland Czerny, Jonas Juffinger, Fabian Rauscher, Simone Franza, Daniel Gruss
Graz University of Technology

Abstract
Inferring user activities on a computer from network traffic is a well-studied attack vector. Previous work has shown that they can infer websites visited, videos watched, and even user actions within specific applications. However, all of these attacks require a scenario where the attacker can observe the (possibly encrypted) network traffic, e.g., through a person- in-the-middle (PITM) attack or sitting in physical proximity to monitor WiFi packets. In this paper, we present SnailLoad, a new side-channel attack where the victim loads an asset, e.g., a file or an image, from an attacker-controlled server, exploiting the victim’s network latency as a side channel tied to activities on the victim system, e.g., watching videos or websites. SnailLoad requires no JavaScript, no form of code execution on the victim system, and no user interaction but only a constant exchange of network packets, e.g., a network connection in the background. SnailLoad measures the latency to the victim system and infers the network activity on the victim system from the latency variations. We demonstrate SnailLoad in a non-PITM video-fingerprinting attack, where we use a single SnailLoad trace to infer what video a victim user is watch- ing momentarily. For our evaluation, we focused on a set of 10 YouTube videos the victim watches, and show that Snail- Load reaches classification F 1 scores of up to 98 %. We also evaluated SnailLoad in an open-world top 100 website fin- gerprinting attack, resulting in an F 1 score of 62.8 %. This shows that numerous prior works, based on network traffic observations in PITM attack scenarios, could potentially be lifted to non-PITM remote attack scenarios.