- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources5
- Resource Type
-
0002100002000000
- More
- Availability
-
41
- Author / Contributor
- Filter by Author / Creator
-
-
Oren, Yossi (5)
-
Yarom, Yuval (3)
-
Curtmola, Reza (2)
-
Genkin, Daniel (2)
-
Shusterman, Anatoly (2)
-
Aben_Sour, Lishay (1)
-
Agarwal, Ayush (1)
-
Avraham, Zohar (1)
-
Croitoru, Eliezer (1)
-
Haskal, Yarden (1)
-
Kang, Lachlan (1)
-
Levi, Dvir (1)
-
Magen, Ron (1)
-
Meltser, Yosef (1)
-
Mittal, Prateek (1)
-
O'Connell, Sioli (1)
-
O’Connell, Sioli (1)
-
Shacham, Hovav (1)
-
Zaheri, Mojtaba (1)
-
Zaheri, Mojtaba Zaheri (1)
-
- Filter by Editor
-
-
null (1)
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Free, publicly-accessible full text available January 1, 2026
-
O'Connell, Sioli; Aben_Sour, Lishay; Magen, Ron; Genkin, Daniel; Oren, Yossi; Shacham, Hovav; Yarom, Yuval (, Usenix Security 2024)Web privacy is challenged by pixel-stealing attacks, which allow attackers to extract content from embedded iframes and to detect visited links. To protect against multiple pixelstealing attacks that exploited timing variations in SVG filters, browser vendors repeatedly adapted their implementations to eliminate timing variations. In this work we demonstrate that past efforts are still not sufficient. We show how web-based attackers can mount cache-based side-channel attacks to monitor data-dependent memory accesses in filter rendering functions. We identify conditions under which browsers elect the non-default CPU implementation of SVG filters, and develop techniques for achieving access to the high-resolution timers required for cache attacks. We then develop efficient techniques to use the pixel-stealing attack for text recovery from embedded pages and to achieve high-speed history sniffing. To the best of our knowledge, our attack is the first to leak multiple bits per screen refresh, achieving an overall rate of 267 bits per second.more » « less
-
Zaheri, Mojtaba Zaheri; Oren, Yossi; Curtmola, Reza (, 31st USENIX Security Symposium (USENIX Security 22))
-
Shusterman, Anatoly; Agarwal, Ayush; O’Connell, Sioli; Genkin, Daniel; Oren, Yossi; Yarom, Yuval (, Usenix Security)null (Ed.)
-
Shusterman, Anatoly; Avraham, Zohar; Croitoru, Eliezer; Haskal, Yarden; Kang, Lachlan; Levi, Dvir; Meltser, Yosef; Mittal, Prateek; Oren, Yossi; Yarom, Yuval (, IEEE Transactions on Dependable and Secure Computing)
An official website of the United States government

Full Text Available