Mohammed Aldeen, Sisheng Liang, Zhenkai Zhang, Linke Guo (Clemson University), Zheng Song (University of Michigan – Dearborn), and Long Cheng (Clemson University)

—Graphics processing units (GPUs) on modern computers are susceptible to electromagnetic (EM) side-channel attacks that can leak sensitive information without physical access to the target device. Website fingerprinting through these EM emanations poses a significant privacy threat, capable of revealing user activities from a distance. This paper introduces EMMasker, a novel software-based solution designed to mitigate such attacks by obfuscating the EM signals associated with web activity. EMMasker operates by generating rendering noise within the GPU using WebGL shaders, thereby disrupting the patterns of EM signals and confounding any attempts at identifying user online activities. Our approach strikes a balance between the effectiveness of obfuscation and system efficiency, ensuring minimal impact on GPU performance and user browsing experience. Our evaluation shows that EMMasker can significantly reduce the accuracy of state-of-the-art EM website fingerprinting attacks from average accuracy from 81.03% to 22.56%, without imposing a high resource overhead. Our results highlight the potential of EMMasker as a practical countermeasure against EM side-channel website fingerprinting attacks, enhancing privacy and security for web users.

View More Papers

coucouArray ( [post_type] => ndss-paper [post_status] => publish [posts_per_page] => 4 [orderby] => rand [tax_query] => Array ( [0] => Array ( [taxonomy] => category [field] => id [terms] => Array ( [0] => 40 [1] => 104 ) ) ) [post__not_in] => Array ( [0] => 17445 ) )

CP-IoT: A Cross-Platform Monitoring System for Smart Home

Hai Lin (Tsinghua University), Chenglong Li (Tsinghua University), Jiahai Yang (Tsinghua University), Zhiliang Wang (Tsinghua University), Linna Fan (National University of Defense Technology), Chenxin Duan (Tsinghua University)

Read More

Don't Interrupt Me – A Large-Scale Study of On-Device...

Marian Harbach (Google), Igor Bilogrevic (Google), Enrico Bacis (Google), Serena Chen (Google), Ravjit Uppal (Google), Andy Paicu (Google), Elias Klim (Google), Meggyn Watkins (Google), Balazs Engedy (Google)

Read More

Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi...

Yuxiang Yang (Tsinghua University), Xuewei Feng (Tsinghua University), Qi Li (Tsinghua University), Kun Sun (George Mason University), Ziqiang Wang (Southeast University), Ke Xu (Tsinghua University)

Read More

Privacy Starts with UI: Privacy Patterns and Designer Perspectives in UI/UX Practice

Anxhela Maloku (Technical University of Munich), Alexandra Klymenko (Technical University of Munich), Stephen Meisenbacher (Technical University of Munich), Florian Matthes (Technical University of Munich)

Vision: Profiling Human Attackers: Personality and Behavioral Patterns in Deceptive Multi-Stage CTF Challenges

Khalid Alasiri (School of Computing and Augmented Intelligence Arizona State University), Rakibul Hasan (School of Computing and Augmented Intelligence Arizona State University)

From Underground to Mainstream Marketplaces: Measuring AI-Enabled NSFW Deepfakes on Fiverr

Mohamed Moustafa Dawoud (University of California, Santa Cruz), Alejandro Cuevas (Princeton University), Ram Sundara Raman (University of California, Santa Cruz)