You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

11 July 2024

A Browser Fingerprint Authentication Scheme Based on the Browser Cache Side-Channel Technology

,
and
1
Faculty of Information Science and Engineering, Ocean University of China, Qingdao 266000, China
2
School of Computer Science and Technology, Liaocheng University, Liaocheng 252000, China
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Recent Advances and Applications of Network Security and Cryptography

Abstract

Users encounter various threats, such as cross-site scripting attacks and session hijacking, when they perform login operations in the browser. These attacks pose significant risks to the integrity and confidentiality of personal data. The browser fingerprint, as an authentication technique, can effectively enhance user security. However, attackers can bypass browser fingerprint authentication through phishing attacks and other methods, leading to unauthorized logins. To address these issues, we propose a secure browser fingerprint authentication scheme that integrates the data of the browser cache side-channel into the traditional browser fingerprint. Consequently, it enhances the dynamics and non-determinism of the browser fingerprint and improves the anti-attack capabilities of the authentication process. Experimental results demonstrate that this scheme can effectively mitigate phishing attacks and man-in-the-middle attacks, achieving a 95.33% recognition rate for attackers and a 96.17% recall rate for authorized users.

1. Introduction

The advent of the Internet has fundamentally transformed the way we interact with information, communicate with others, and conduct business [1]. Central to this digital revolution is the browser, a software application that enables users to access and navigate the vast expanse of the World Wide Web [2]. Today, the technologies to enrich the user experience are evolving at an amazing pace [3]. Browsers have become indispensable tools for virtually every aspect of modern life, facilitating everything from online shopping and social networking to research and entertainment [4].
Browser authentication is crucial for maintaining data privacy, preventing identity theft, and enforcing secure access controls in the online environment. Most sites rely on relatively weak forms of authentication [5], and passwords are the default solution [6]. However, the widespread reliance on username-password-based authentication poses significant challenges [7,8]. As early as 2016, research indicated that over 3.3 billion credentials had been compromised through this approach alone. Meanwhile, phishing attacks significantly increase the risk of account hijacking [9]. While multi-factor authentication (MFA) [10,11] can enhance user security, the introduction of additional authentication factors increases the complexity and time cost of the user login process.
Browser fingerprint, as a stateless technique [12], harnesses user device data (e.g., browser type, operating system, installed plugins, etc.) collected by the browser to construct a distinct device identifier [13]. Browser fingerprinting for authentication is a way to put browser fingerprints in the service of benign purposes [14]. Unlike traditional username-password authentication methods, browser fingerprint authentication is considerably more resistant to cracking, thus enhancing user security, which is a promising additional web authentication factor [15].
However, current browser fingerprint authentication technology faces two significant challenges. First, the weak stability of browser fingerprints contradicts the need for a relatively stable credential for authentication. Since browser fingerprints directly reflect users’ devices and their environment, any modifications or updates to device parameters can easily alter the browser fingerprint [16]. Second, browser fingerprints are vulnerable to illegitimate theft by attackers through techniques such as cross-site scripting (XSS) and cross-site request forgery (CSRF). Additionally, they are susceptible to phishing attacks [17] and man-in-the-middle attacks [18]. Specifically, malicious websites can collect users’ fingerprints and use them to mimic their devices, therefore bypassing authentication mechanisms. Simultaneously, attackers can intercept users’ login information and tamper with users’ identities to achieve authentication. These vulnerabilities undermine the reliability and security of browser fingerprint authentication, necessitating further advancements to address these concerns and enhance the overall robustness of the authentication process.
To tackle these challenges, we propose a browser fingerprint authentication scheme based on browser cache side-channel technology [19]. First, we utilize Fast Fourier Transform (FFT) to map browser cache side-channel data into a unique browser fingerprint attribute. Since browser cache side-channel data are closely tied to the hardware information of user devices, this approach significantly improves stability compared to traditional browser fingerprint authentication methods. Furthermore, due to the diversity of hardware devices, attackers are unable to replicate user devices, therefore thwarting phishing attacks. Second, we introduce the concept of timestamps. By recording the time when fingerprint collection is completed and analyzing the duration of fingerprint collection, we can detect man-in-the-middle attacks. This dual-pronged approach aims to enhance the security and reliability of browser identity authentication, mitigating the vulnerabilities associated with traditional methods and bolstering overall protection against malicious activities in the online environment.
In summary, the main contributions of this paper are summarized below:
  • We propose a more stable and secure browser fingerprint authentication scheme that integrates browser cache side-channel technology, therefore mitigating phishing attacks.
  • We introduce the timestamp to identify man-in-the-middle (MITM) attacks by analyzing the duration of fingerprint collection.
  • We test and analyze the uniqueness and stability of browser cache side-channel data across 11 different computer devices. Furthermore, the accuracy of the proposed authentication scheme is tested, with experimental results indicating a recall rate of 96.17% even in the presence of man-in-the-middle and phishing attacks.
The remaining sections of the paper are structured as follows. We review the state-of-the-art in Section 2, including browser cache side-channel technology and browser fingerprint authentication technology. Section 3 introduces the system model, the threat model, and the design goals of the proposed scheme, followed by its detailed design in Section 4. We analyze the security and privacy of the scheme regarding resistance against man-in-the-middle attacks and phishing attacks in Section 5. Section 6 conducts experiments to evaluate the uniqueness, stability, and accuracy of the scheme. Finally, we draw a conclusion in the Section 7.

3. Problem Statement

In this section, we illustrate the system model, the threat model, and the design goals of this scheme and describe the notation involved in the scheme, as shown in Table 1.
Table 1. The Explanation of Notations.

3.1. System Models

The system model of this scheme is shown in Figure 3, which contains two main entities: the server and clients.
Figure 3. System Model.
Clients: Clients mainly refer to the user devices, which are mainly responsible for collecting the browser cache side-channel data and the timestamp of the data collection completion.
Server: The server authenticates clients based on received data. Initially, it converts browser cache side-channel data into browser fingerprints to perform identity authentication. Subsequently, it utilizes the timestamp to determine whether the data sent by the client has been maliciously altered, therefore preventing man-in-the-middle attacks. In this paper, we assume that the server is a trusted entity.

3.2. Threat Models

The browser fingerprint authentication process is threatened by two main types of attacks: phishing attacks and man-in-the-middle attacks.

3.2.1. Phishing Attacks

Phishing attacks trick users into divulging their browser fingerprint data to malicious attackers under the guise of a legitimate entity or service [36,37,38]. By designing an official-looking website with the capability of browser fingerprint collection, the attacker induces the victim to log in and perform authentication operations. In this way, the attacker illegally obtains the victim’s login credentials and realizes authentication.

3.2.2. Man-in-the-Middle Attack

A man-in-the-middle (MITM) attack is a type of cyberattack where a malicious attacker intercepts communication between two parties without their knowledge [39,40]. Attackers position themselves between the server and clients, allowing them to eavesdrop on the communication, manipulate the data being transmitted, and, in some cases, inject their own malicious content into the conversation.

3.3. Design Goals

We intend to design a secure browser fingerprint authentication scheme based on the browser cache side-channel technology, supporting uniqueness, stability, phishing attack resistance, and man-in-the-middle attack resistance.
  • Uniqueness: A secure browser fingerprint authentication scheme demonstrates uniqueness if the cache side-channel data from different devices exhibit distinct characteristics from each other.
  • Stability: A secure browser fingerprint authentication scheme holds stability if the cache side-channel data from one device remains highly consistent over time.
  • Phishing attack resistance: A secure browser fingerprint authentication scheme exhibits resistance to phishing attacks if it can identify an attacker who fraudulently obtains users’ browser fingerprint data under the guise of a legitimate entity or service.
  • Man-in-the-middle attack resistance: A secure browser fingerprint authentication scheme demonstrates resistance to man-in-the-middle attacks if it can detect an attacker who intercepts communication between two parties without their knowledge.

4. Scheme Design

Our scheme contains four steps: data collection, data processing, browser fingerprint generation, and timestamp analysis. Clients initially collect browser cache side-channel data and subsequently transmit it to the server. Upon receiving the data, the server conducts a Fast Fourier Transform (FFT), therefore mapping the data to a browser fingerprint and proceeding with authentication. Furthermore, based on the timestamp, the server assesses whether the data sent by the client has been maliciously altered to prevent man-in-the-middle attacks.
Next, we describe the scheme in detail according to these four steps.

4.1. Data Collection

We collect the browser cache side-channel data based on the Prime and Probe technique proposed by Mojtaba et al. [19]. The data are represented by a matrix X with N rows and M columns, as referenced in Equation (1). Each row in the matrix represents a set of time-domain eigenvalue sequences extracted by performing a browser cache side-channel operation, where N indicates the number of executions.
X = x 11 , x 12 , , x 1 M x 21 , x 22 , , x 2 M x N 1 , x N 2 , , x N M
For clarity and differentiation, data collected during user registration are denoted as matrices A 1 and A 2 , where A 1 serves as the baseline value. Subsequently, data collected during logins is represented using matrix B.

4.2. Data Processing

Upon receiving the browser cache side-channel data B sent by the client during logins, the server processes it according to the procedure outlined in Figure 4. Initially, the server calculates the average values of each column of the array and transforms them into a non-periodic curve. Subsequently, all elements of the array are normalized and converted into complex numbers, with their length extended to the nearest power of two. The FFT algorithm is then applied to the array with the butterfly operation to reduce the overall computational effort. Finally, authentication is performed by calculating the correlation between two different sets of data using the Inverse FFT (IFFT) algorithm and the K-Nearest Neighbors (KNN) algorithm. The specific process is described as follows:
Figure 4. The process of cache side-channel data processing.
  • Mean Computation
    We convert the cache side-channel data A 1 , A 2 , and B into one-dimensional vectors A 1 ¯ , A 2 ¯ , and B ¯ according to the following equation:
    X ¯ = ( x ¯ 1 , x ¯ 2 , , x ¯ m , , x ¯ M ) , x ¯ m = 1 N n = 1 N x n m , m = 1 , 2 , , M
  • Complex Formulation
    Subsequently, we apply Equation (3) to convert the elements within the vectors A 1 ¯ , A 2 ¯ , and B ¯ into complex numbers, and pad their length to the smallest power of 2.
    X ¯ = ( x 1 ¯ + 0 i ) , ( x 2 ¯ + 0 i ) , , ( x m ¯ + 0 i ) , ( 0 + 0 i ) , , ( 0 + 0 i ) 2 log 2 ( M ) M times
  • Fast Fourier Transform
    FFT is an efficient algorithm to execute the Discrete Fourier Transform (DFT). It is a mathematical operation that transforms data from the time domain into a representation in the frequency domain. It can effectively analyze the frequency domain features of the data and help identify the similarity between two sets of data. We apply the FFT algorithm, as shown in Algorithm 1, to convert the vector X ¯ to a vector F representing data in the frequency domain. Initially, the elements in the vector X ¯ are divided into two parts: elements with even indexes and elements with odd indexes. Subsequently, F is computed by recursively performing the Fourier transform based on these two parts. During this process, the butterfly operation is employed to reduce the overall computational effort by combining smaller Fourier transforms into larger ones through recursion.
    Algorithm 1 FFT
     1:
    Input: X ¯
     2:
    Output: F
     3:
    l = length ( X ¯ )
     4:
    if  l = = 1  then
     5:
         return X ¯
     6:
    end if
     7:
    X ¯ e v e n = { F F T ( x ¯ 2 k 1 ) } , k = 1 , 2 , , l 2  ▹ elements of X ¯ with even indexes
     8:
    X ¯ o d d = { F F T ( x ¯ 2 k ) } , k = 1 , 2 , , l 2     ▹ elements of X ¯ with odd indexes
     9:
    for k from 1 to l / 2  do             ▹ Perform the butterfly operation
    10:
         W l k = e ( 2 π i / l ) k                 ▹ Calculate the rotation factor
    11:
         f k = x ¯ e v e n k + W l k x ¯ o d d k
    12:
         f k + l / 2 = x ¯ e v e n k W l k x ¯ o d d k
    13:
    end for
    14:
    return  F = { f 1 , f 2 , f l }
  • Correlation analysis
    According to Equation (4), we utilize the convolution theorem in the frequency domain to compute the correlation R A 1 A 2 between data A 1 and A 2 , and R A 1 B between data A 1 and B, respectively. FFT*() denotes the covariance result after the Fast Fourier Transform, and IFFT() denotes the Inverse Fast Fourier Transform.
    R X 1 X 2 = M a x { IFFT ( FFT ( X 1 ¯ ) j · FFT ( X 2 ¯ ) j ) }
    The IFFT algorithm is the inverse operation of the Fast Fourier Transform. As shown in Algorithm 2, it transforms the product of browser cache side-channel data X 1 and X 2 in the frequency domain (denoted by F 1 = { f 1 , 1 , f 1 , 2 , f 1 , l } and F 2 = { f 2 , 1 , f 2 , 2 , f 2 , l } , respectively) to a vector R representing a list of correlations between X 1 and X 2 . The process begins by determining the length of the arrays. Each element of F 1 is then multiplied by the conjugate of the corresponding element in F 2 , with the results stored in a temporary array r t e m . This temporary array is subsequently conjugated and transformed using the FFT algorithm. The resulting array, F 3 , is again conjugated, and both its real and imaginary parts are normalized by dividing by the array length. The final result, R, represents the correlations between the original data sets in the time domain.
    Algorithm 2 IFFT
     1:
    Input: F 1 , F 2
     2:
    Output: R
     3:
    l = length ( F 1 ) = length ( F 2 )
     4:
    for j from 1 to l do   ▹ Multiply each element of F 1 by the conjugate
     5:
                  of the corresponding element F 2
     6:
         f 2 , j = c o n j ( f 2 , j )                ▹ Conjugate operation
     7:
         r t e m , j = f 1 , j f 2 , j
     8:
    end for
     9:
    for j from 1 to l do
    10:
         r t e m , j = c o n j ( r t e m , j )
    11:
    end for
    12:
    F 3 = F F T ( R t e m = { r t e m , 1 , r t e m , 2 , , r t e m , l } ) = { f 3 , 1 , f 3 , 2 , f 3 , l }
    13:
    for j from 1 to l do
    14:
         r j = c o n j ( f 3 , j )
    15:
         r j , r e a l = r j , r e a l / l                  ▹ the real part of r j
    16:
         r j , i m a g = r j , i m a g / l               ▹ the imaginary part of r j
    17:
    end for
    18:
    return  R = { r 1 , r 2 , , r l }

4.3. Browser Fingerprint Generation

We apply the browser fingerprint generation (BFG) algorithm based on Manhattan distance and the KNN algorithm to transform data correlation into browser fingerprints for authentication. The KNN algorithm, as shown in Algorithm 3, is a distance-based machine-learning classification method that predicts the category of a new value based on the categories of the k nearest data points. Its theoretical maturity and lack of an extensive training process make it well-suited for enhancing real-time fingerprint identification. We collect n sets of baseline value data ( A 1 , 1 , A 1 , 2 , A 1 , n ) for each user during the registration phase, where n = K / 2 + 1 and K is the number of nearest neighbors applied in the KNN algorithm. We use the symbol D to denote the correlation generated in the registration phase by all users. For m users, D = { R A 1 , j A 2 i } , where i [ 1 , m ] and j [ 1 , n ] . The Manhattan distance d q between the correlation R A 1 B and R A 1 , j A 2 i is calculated according to Equation (5) when a user logs in.
d j i = R A 1 B R A 1 , j A 2 i , i [ 1 , m ] , j [ 1 , n ]
The results are sorted in ascending order, and the first K Manhattan distances are selected as the nearest neighbors. Subsequently, the user’s identity of data B denoted by U B is determined based on the principle of majority voting.
Algorithm 3 BFG
 1:
Input: R A 1 , j B , D , K , C u p
 2:
Output: U B
 3:
d = [ ]                    ▹ Create a list
 4:
for i from 1 to m do
 5:
    for j from 1 to n do
 6:
         d j i = R A 1 B R A 1 , j A 2 i
 7:
         d . a p p e n d ( d j i )
 8:
    end for
 9:
end for
10:
d = s o r t ( d )              ▹ In ascending order
11:
for k from 0 to K 1  do
12:
    Parse d [ k ] as R A 1 B R A 1 , j A 2 i
13:
     v o t e U i + +   ▹ Vote count for U i is incremented by one
14:
end for
15:
Set v o t e U B = m a x { v o t e U 1 , v o t e U 2 , v o t e U m }
16:
return  U B

4.4. Timestamp Analysis

However, in the above process, an attacker can launch man-in-the-middle attacks to indirectly bypass the authentication mechanism. Malware in the middle of communication can monitor and alter confidential information [41]. To prevent this attack, we introduce the concept of timestamp. Specifically, we assume that the server notifies a client at time T s e n d and subsequently receives data from the client at time T r e c e i v e . Upon completing the browser cache side-channel data collection, the client records the time as T e n d and transmits both the data and the timestamp to the server. We assume that the network remains stable for a brief period. In this scenario, the duration of data collection t c o l l e c t can be expressed as Equation (6).
t c o l l e c t = ( T r e c e i v e T s e n d ) ( T r e c e i v e T e n d ) 2
We set a threshold Δ t . When t c o l l e c t Δ t , it is inferred that no man-in-the-middle attack has occurred. Conversely, if t c o l l e c t > Δ t , it is deduced that a man-in-the-middle attack has transpired. Even in the presence of network delays, as illustrated in Figure 5, the duration for data collection remains consistent, expressed as t c o l l e c t = ( T r e c e i v e T s e n d ) ( T r e c e i v e T e n d ) × 2 = t c o l l e c t , where T e n d and T r e c e i v e denote the completion time of data collection and the time of receiving data in the delayed environment, respectively. Through this analysis, we ascertain that our scheme remains unaffected by network delays.
Figure 5. Comparison of Authentication Duration in a Normal Environment and Delay Environment.

5. Security and Privacy Analysis

This section analyzes how this scheme can successfully protect user privacy and resist both man-in-the-middle attacks and phishing attacks.

5.1. Security Analysis

5.1.1. Resistance to Man-in-the-Middle Attacks

This scheme can resist man-in-the-middle attacks against IP redirection and timestamp modification.
  • IP redirection
    The attacker attempts to achieve unauthorized login by altering the IP address upon receiving data from victims. In this case, the duration of fingerprint collection is represented as T c o l l e c t = ( T r e c e i v e T s e n d ) ( T r e c e i v e T e n d ) 2 , where T r e c e i v e denotes the time of receiving data when encountering man-in-the-middle attacks. As shown in Figure 6, the process by which attackers alter IP addresses extends the duration of fingerprint collection, ultimately falling outside the normal range.
    Figure 6. Comparison of Authentication Duration between Normal Login and IP Redirection.
  • Timestamp Modification
    Additionally, the attacker may attempt to manipulate the completion time of the browser cache side-channel data collection ( T e n d ) to ensure that the overall duration of data collection appears normal. As shown in Figure 7, according to Equation (7), executing this attack requires the attacker to simultaneously know the start time of data collection ( T s t a r t ), T s e n d , and T r e c e i v e . However, T s e n d and T r e c e i v e are collected only on the server side, which is a trusted entity. Additionally, T s t a r t is not collected during the entire communication process. Therefore, this scheme effectively mitigates man-in-the-middle attacks involving timestamp modification.
    T e n d = T e n d + ( T r e c e i v e T s e n d T c o l l e c t ) / 2 ( T s t a r t T s e n d )
    Figure 7. Timeline when Timestamp Modification.
In summary, this scheme can effectively resist man-in-the-middle attacks.

5.1.2. Resistance to Phishing Attacks

Browser cache side-channel data are tightly bound to users’ devices. For device fingerprinting [42], even if these data are obtained illicitly by an attacker through phishing attacks, it is challenging for the attacker to simulate it on their device without access to detailed parameters of the victim’s device. Moreover, the diversity of devices further decreases the likelihood of collision. Consequently, our scheme effectively resists phishing attacks.

5.2. Privacy Analysis

On one hand, the browser cache side-channel data are a mapping of hardware devices and external resources. Without knowledge of the external resources, an attacker cannot infer the hardware device parameters through the browser cache side-channel data. On the other hand, hardware device parameters do not contain the personal identity information of the user. Even if an attacker illegally obtains hardware device parameters, it is impossible to obtain any information related to the user’s identity. Therefore, the browser cache side-channel data do not pose a threat to user privacy.

6. Evaluation

In this section, we first analyze the computation complexity of algorithms proposed in Section 4. Subsequently, we verify the uniqueness and stability of the browser cache side-channel data. Finally, we test the accuracy of our browser fingerprint authentication scheme.

6.1. Computation Overhead

We analyze the computation complexity of three algorithms, FFT, IFFT, and BFG, as shown in Table 2:
Table 2. Algorithmic Computation Complexity.
The FFT and IFFT algorithms both exhibit a complexity of O ( l · log l ) , where l represents the length of the input. These two algorithms are independent of the number of users, making them highly suitable for a wide range of applications. The BFG algorithm, with a complexity of O ( m n · log ( m n ) ) , where m and n denote the number of users and baseline values, respectively, scales sub-exponentially with the number of users. It is relatively more computationally intensive. However, for moderate problem sizes, this overhead remains manageable. To improve scalability, we can further enhance the computation efficiency by employing optimization strategies such as multi-threading, multiple servers, or high-performance server configurations.

6.2. Uniqueness Test

We initially tested uniqueness by comparing the correlation of browser cache side-channel data from 11 different devices. The configurations of these devices are detailed in Table 3.
Table 3. Device Configuration.
All devices’ browsers execute the registration operation with the same baseline value. Subsequently, each device performs 300 login operations to collect browser cache side-channel data, followed by correlation calculations with the baseline value. As depicted in Figure 8, it is evident that browser cache side-channel data from different devices exhibit high uniqueness after FFT operations and correlation calculations.
Figure 8. Browser Cache Side-channel Data Correlation Results from Different Devices.

6.3. Stability Test

We test the stability of browser cache side-channel data by comparing its correlation across time. Our scheme is implemented on a desktop running the Windows 10 operating system, equipped with an Intel Core i7 CPU and 32 GB of RAM.
We perform login operations every three months, collecting 50 sets of browser cache side-channel data each time. Subsequently, we calculate their correlation with the baseline value. As illustrated in Figure 9, the correlation results of the browser cache side-channel data from the same device remain highly similar after two months, indicating a high degree of stability of the browser cache side-channel data.
Figure 9. Browser Cache Side-channel Data Correlation Results of Different Time.

6.4. Accuracy Test

We evaluate the accuracy of our browser fingerprint authentication using the following metrics:
  • Recall Rate ( R E C ): The proportion of legitimate users judged to be legitimate users.
  • False Acceptance Rate ( F A R ): The proportion of illegal users judged to be legitimate users.
  • False Rejection Rate ( F R R ): The proportion of legitimate users judged to be illegitimate users.
These metrics are calculated based on the following equations:
R E C = T P / ( T P + F N )
F A R = F P / ( F P + T N )
F R R = F N / ( T P + F N )
Among them, true positive ( T P ) denotes the number of legitimate users judged to be legitimate users, false negative ( F N ) denotes the number of legitimate users judged to be illegal users, false positive ( F P ) denotes the number of illegal users judged to be legitimate users, and true negative ( T N ) denotes the number of illegal users judged to be illegal users.
We designate 15 groups of devices, with configurations selected from Table 3, to act as attackers and victims, respectively. In this setup, attackers attempt to obtain the victim’s account, password, and other information through phishing attacks, simulating the victim’s login. This experiment collects 300 pieces of browser cache side-channel data to generate browser fingerprints. The fingerprints provided by the attacker and the victim are mixed before being sent to the server for verification.
We first test the effect of different values of K on the R E C . As presented in Figure 10, R E C is highly sensitive to noise when K = 2 because only 1 nearest neighbor is considered, resulting in lower accuracy. The highest R E C , at 96.17%, is achieved when K = 3 . The R E C shows a gradual decrease as the value of K increases beyond 3.
Figure 10. The Effect of Different K Values on Recall Rate.
Then, we test the effect of different values of K on the F A R . As shown in Figure 11, the lowest FAR, at 0, is achieved when K = 2 . The F A R increases when K 6 , and becomes stable when K > 6 .
Figure 11. The Effect of Different K Values on False Acceptance Rate.
Finally, we test the effect of different values of K on the F R R . As shown in Figure 12, the F R R reaches its minimum at 3.83% when K = 3 . Beyond this point, the F R R exhibits an upward trend as the value of K continues to increase.
Figure 12. The Effect of Different K Values on False Rejection Rate.
The verification results for K = 2 and K = 3 are summarized in Table 4. In summary, the values of R E C and F R R are optimized at 96.17% and 3.83%, respectively, when K = 3, with F A R at 4.67%. When K = 2 , F A R reaches its minimum at 0%, while R E C and F R R are 91.58% and 8.42%, respectively. These values demonstrate that our scheme exhibits strong resistance to phishing attacks [35].
Table 4. The Accuracy of Our Browser Fingerprint Authentication Scheme when K = 2 and K = 3.
The (Cross-)Browser Fingerprinting scheme [43] achieved authentication by extracting and combining stable features of the operating system and hardware across different browsers on the same device to create unique user fingerprints, yielding a R E C of 90.84% and a F R R of 9.16%. As shown in Table 5, our scheme significantly improves the R E C compared to this method. Additionally, the FP-Inspector scheme [44] realized authentication by combining static and dynamic analysis of illegal behaviors through a machine-learning approach. It detects browser fingerprinting through machine-learning classifiers that extract features from script contents and execution traces. This scheme has a F A R of 6.2%, which is higher than that of our scheme.
Table 5. Performance Comparison.

7. Conclusions

We proposed a browser fingerprint authentication scheme in this paper, which integrates browser cache side-channel technology. It offers a promising solution to enhance user security during online authentication processes. By leveraging the stability and uniqueness of browser cache side-channel data, this scheme effectively mitigates phishing attacks and man-in-the-middle attacks, achieving high recognition and recall rates for both attackers and authorized users. The experimental results demonstrate the scheme’s ability to resist malicious activities and maintain a high level of authentication accuracy even in the presence of sophisticated attacks. Overall, this innovative approach contributes to strengthening browser identity authentication, addressing the limitations of traditional methods, and bolstering overall protection in the online environment.
This scheme relies on the assumption that the server is fully trusted and secure, making it vulnerable to attacks targeting the server in reality. If an attacker gains control of the server, authentication anomalies and potential breaches could occur. Additionally, this scheme, like many security solutions, faces significant challenges in defending against zero-day attacks. These sophisticated attacks exploit previously unknown vulnerabilities, making detection and mitigation difficult with existing measures. To enhance security, we could deploy a Trusted Execution Environment (TEE) within the server in future work. A TEE can provide a secure, isolated area to perform sensitive operations, protecting the server from external attacks. Moreover, future work could incorporate machine-learning models for anomaly detection to improve the scheme’s ability to identify zero-day attacks. These models can analyze patterns in browser cache side-channel data and user behavior to detect deviations that might indicate an exploit. Additionally, regular security audits and penetration testing should be conducted to identify and address potential vulnerabilities proactively. Combining these strategies can significantly fortify the scheme against zero-day attacks, enhancing overall system resilience.

Author Contributions

Conceptualization, Y.Y.; methodology, Y.Y.; software, Y.Y.; validation, Y.Y.; formal analysis, Y.Y. and H.Q.; investigation, Y.Y.; resources, Y.Y.; data curation, Y.Y.; writing—original draft preparation, Y.Y. and H.Z.; writing—review and editing, Y.Y., H.Z. and H.Q. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the Undergraduate Teaching Reform Research Program of Shandong Province (No. M2023218).

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Rock, L.Y.; Tajudeen, F.P.; Chung, Y.W. Usage and impact of the internet-of-things-based smart home technology: A quality-of-life perspective. Univers. Access Inf. Soc. 2024, 23, 345–364. [Google Scholar] [CrossRef] [PubMed]
  2. Laperdrix, P.; Bielova, N.; Baudry, B.; Avoine, G. Browser fingerprinting: A survey. ACM Trans. Web (TWEB) 2020, 14, 1–33. [Google Scholar] [CrossRef]
  3. Laperdrix, P.; Rudametkin, W.; Baudry, B. Beauty and the beast: Diverting modern web browsers to build unique browser fingerprints. In Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–26 May 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 878–894. [Google Scholar]
  4. DiMaggio, P.; Hargittai, E.; Neuman, W.R.; Robinson, J.P. Social implications of the Internet. Annu. Rev. Sociol. 2001, 27, 307–336. [Google Scholar] [CrossRef]
  5. Ross, B.; Jackson, C.; Miyake, N.; Boneh, D.; Mitchell, J.C. Stronger Password Authentication Using Browser Extensions. In Proceedings of the USENIX Security Symposium, Baltimore, MD, USA, 31 July–5 August 2005; Volume 17, p. 32. [Google Scholar]
  6. Laperdrix, P.; Avoine, G.; Baudry, B.; Nikiforakis, N. Morellian analysis for browsers: Making web authentication stronger with canvas fingerprinting. In Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment: 16th International Conference, DIMVA 2019, Gothenburg, Sweden, 19–20 June 2019; Proceedings 16. Springer: Berlin/Heidelberg, Germany, 2019; pp. 43–66. [Google Scholar]
  7. Al Kabir, M.A.; Elmedany, W. Adaptive Risk-Based Passwordless Authentication: A Fido2 Integrated Approach for Enhanced Security and Usability. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4795401 (accessed on 9 July 2024).
  8. Tyagi, V.; Saraswat, A.; Bansal, S. An Analysis of Securing Internet of Things (IoT) Devices from Man-in-the-Middle (MIMA) and Denial of Service (DoS). In Smart Cities; CRC Press: Boca Raton, FL, USA, 2023; pp. 337–357. [Google Scholar]
  9. Andriamilanto, N.; Allard, T.; Le Guelvouit, G. FPSelect: Low-cost browser fingerprints for mitigating dictionary attacks against web authentication mechanisms. In Proceedings of the 36th Annual Computer Security Applications Conference, Virtual, 7–11 December 2020; pp. 627–642. [Google Scholar]
  10. Otta, S.P.; Panda, S.; Gupta, M.; Hota, C. A systematic survey of multi-factor authentication for cloud infrastructure. Future Internet 2023, 15, 146. [Google Scholar] [CrossRef]
  11. Mohammed, A.H.Y.; Dziyauddin, R.A.; Latiff, L.A. Current multi-factor of authentication: Approaches, requirements, attacks and challenges. Int. J. Adv. Comput. Sci. Appl. 2023, 14, 166–177. [Google Scholar] [CrossRef]
  12. Gómez-Boix, A.; Laperdrix, P.; Baudry, B. Hiding in the crowd: An analysis of the effectiveness of browser fingerprinting at large scale. In Proceedings of the 2018 World Wide Web Conference, Lyon, France, 23–27 April 2018; pp. 309–318. [Google Scholar]
  13. Upathilake, R.; Li, Y.; Matrawy, A. A classification of web browser fingerprinting techniques. In Proceedings of the 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 27–29 July 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 1–5. [Google Scholar]
  14. Durey, A.; Laperdrix, P.; Rudametkin, W.; Rouvoy, R. FP-Redemption: Studying browser fingerprinting adoption for the sake of web security. In Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment: 18th International Conference, DIMVA 2021, Virtual Event, 14–16 July 2021; Proceedings 18. Springer: Berlin/Heidelberg, Germany, 2021; pp. 237–257. [Google Scholar]
  15. Andriamilanto, N.; Allard, T.; Guelvouit, G.L. “Guess Who?” Large-scale data-centric study of the adequacy of browser fingerprints for web authentication. In Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing: Proceedings of the 14th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2020), Lodz, Poland, 1–3 July 2020; Springer: Berlin/Heidelberg, Germany, 2021; pp. 161–172. [Google Scholar]
  16. Eckersley, P. How unique is your web browser? In Proceedings of the Privacy Enhancing Technologies: 10th International Symposium, PETS 2010, Berlin, Germany, 21–23 July 2010; Proceedings 10. Springer: Berlin/Heidelberg, Germany, 2010; pp. 1–18. [Google Scholar]
  17. Bursztein, E.; Benko, B.; Margolis, D.; Pietraszek, T.; Archer, A.; Aquino, A.; Pitsillidis, A.; Savage, S. Handcrafted fraud and extortion: Manual account hijacking in the wild. In Proceedings of the 2014 Conference on Internet Measurement Conference, Vancouver, BC, Canada, 5–7 November 2014; pp. 347–358. [Google Scholar]
  18. Sanchez-Rola, I.; Bilge, L.; Balzarotti, D.; Buescher, A.; Efstathopoulos, P. Rods with laser beams: Understanding browser fingerprinting on phishing pages. In Proceedings of the 32nd USENIX Security Symposium (USENIX Security 23), Anaheim, CA, USA, 9–11 August 2023; pp. 4157–4173. [Google Scholar]
  19. Zaheri, M.; Oren, Y.; Curtmola, R. Targeted deanonymization via the cache side channel: Attacks and defenses. In Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), Boston, MA, USA, 10–12 August 2022; pp. 1505–1523. [Google Scholar]
  20. Ge, Q.; Yarom, Y.; Cock, D.; Heiser, G. A survey of microarchitectural timing attacks and countermeasures on contemporary hardware. J. Cryptogr. Eng. 2018, 8, 1–27. [Google Scholar] [CrossRef]
  21. Bazm, M.M.; Sautereau, T.; Lacoste, M.; Sudholt, M.; Menaud, J.M. Cache-based side-channel attacks detection through intel cache monitoring technology and hardware performance counters. In Proceedings of the 2018 Third International Conference on Fog and Mobile Edge Computing (FMEC), Barcelona, Spain, 23–26 April 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 7–12. [Google Scholar]
  22. Randolph, M.; Diehl, W. Power side-channel attack analysis: A review of 20 years of study for the layman. Cryptography 2020, 4, 15. [Google Scholar] [CrossRef]
  23. Standaert, F.X. Introduction to side-channel attacks. In Secure Integrated Circuits and Systems; Springer: Berlin/Heidelberg, Germany, 2010; pp. 27–42. [Google Scholar]
  24. Gruss, D.; Maurice, C.; Wagner, K.; Mangard, S. Flush+ Flush: A fast and stealthy cache attack. In Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, 7–8 July 2016; Proceedings 13. Springer: Berlin/Heidelberg, Germany, 2016; pp. 279–299. [Google Scholar]
  25. Osvik, D.A.; Shamir, A.; Tromer, E. Cache attacks and countermeasures: The case of AES. In Proceedings of the Topics in Cryptology—CT-RSA 2006: The Cryptographers’ Track at the RSA Conference 2006, San Jose, CA, USA, 13–17 February 2005; Proceedings. Springer: Berlin/Heidelberg, Germany, 2006; pp. 1–20. [Google Scholar]
  26. Shusterman, A.; Avraham, Z.; Croitoru, E.; Haskal, Y.; Kang, L.; Levi, D.; Meltser, Y.; Mittal, P.; Oren, Y.; Yarom, Y. Website fingerprinting through the cache occupancy channel and its real world practicality. IEEE Trans. Dependable Secur. Comput. 2020, 18, 2042–2060. [Google Scholar] [CrossRef]
  27. Cronin, P.; Gao, X.; Wang, H.; Cotton, C. An exploration of ARM system-level cache and GPU side channels. In Proceedings of the 37th Annual Computer Security Applications Conference, Virtual Conference, 6–10 December 2021; pp. 784–795. [Google Scholar]
  28. Andriamilanto, N.; Allard, T.; Le Guelvouit, G.; Garel, A. A large-scale empirical analysis of browser fingerprints properties for web authentication. ACM Trans. Web (TWEB) 2021, 16, 1–62. [Google Scholar] [CrossRef]
  29. Nikiforakis, N.; Kapravelos, A.; Joosen, W.; Kruegel, C.; Piessens, F.; Vigna, G. Cookieless monster: Exploring the ecosystem of web-based device fingerprinting. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 19–22 May 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 541–555. [Google Scholar]
  30. Queiroz, J.S.; Feitosa, E.L. A web browser fingerprinting method based on the web audio API. Comput. J. 2019, 62, 1106–1120. [Google Scholar] [CrossRef]
  31. Karami, S.; Ilia, P.; Solomos, K.; Polakis, J. Carnus: Exploring the Privacy Threats of Browser Extension Fingerprinting. In Proceedings of the 27th Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 23–26 February 2020. [Google Scholar]
  32. Stragapede, G.; Vera-Rodriguez, R.; Tolosana, R.; Morales, A.; Acien, A.; Le Lan, G. Mobile behavioral biometrics for passive authentication. Pattern Recognit. Lett. 2022, 157, 35–41. [Google Scholar] [CrossRef]
  33. Sánchez, P.M.S.; Valero, J.M.J.; Celdrán, A.H.; Bovet, G.; Pérez, M.G.; Pérez, G.M. A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets. IEEE Commun. Surv. Tutor. 2021, 23, 1048–1077. [Google Scholar] [CrossRef]
  34. Andriamilanto, N.; Allard, T. Brfast: A tool to select browser fingerprinting attributes for web authentication according to a usability-security trade-off. In Proceedings of the Companion Proceedings of the Web Conference 2021, Ljubljana, Slovenia, 19–23 April 2021; pp. 701–704. [Google Scholar]
  35. Lin, X.; Ilia, P.; Solanki, S.; Polakis, J. Phish in sheep’s clothing: Exploring the authentication pitfalls of browser fingerprinting. In Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), Boston, MA, USA, 10–12 August 2022; pp. 1651–1668. [Google Scholar]
  36. Alkhalil, Z.; Hewage, C.; Nawaf, L.; Khan, I. Phishing attacks: A recent comprehensive study and a new anatomy. Front. Comput. Sci. 2021, 3, 563060. [Google Scholar] [CrossRef]
  37. Alabdan, R. Phishing attacks survey: Types, vectors, and technical approaches. Future Internet 2020, 12, 168. [Google Scholar] [CrossRef]
  38. Gupta, B.B.; Tewari, A.; Jain, A.K.; Agrawal, D.P. Fighting against phishing attacks: State of the art and future challenges. Neural Comput. Appl. 2017, 28, 3629–3654. [Google Scholar] [CrossRef]
  39. Conti, M.; Dragoni, N.; Lesyk, V. A survey of man in the middle attacks. IEEE Commun. Surv. Tutor. 2016, 18, 2027–2051. [Google Scholar] [CrossRef]
  40. Callegati, F.; Cerroni, W.; Ramilli, M. Man-in-the-Middle Attack to the HTTPS Protocol. IEEE Secur. Priv. 2009, 7, 78–81. [Google Scholar] [CrossRef]
  41. Mallik, A. Man-in-the-middle-attack: Understanding in simple words. Cyberspace J. Pendidik. Teknol. Inf. 2019, 2, 109–134. [Google Scholar] [CrossRef]
  42. Alaca, F.; Van Oorschot, P.C. Device fingerprinting for augmenting web authentication: Classification and analysis of methods. In Proceedings of the 32nd Annual Conference on Computer Security Applications, Los Angeles, CA, USA, 5–9 December 2016; pp. 289–301. [Google Scholar]
  43. Cao, Y.; Li, S.; Wijmans, E. (Cross-) browser fingerprinting via OS and hardware level features. In Proceedings of the Proceedings 2017 Network and Distributed System Security Symposium. Internet Society, San Diego, CA, USA, 26 February–1 March 2017. [Google Scholar]
  44. Iqbal, U.; Englehardt, S.; Shafiq, Z. Fingerprinting the fingerprinters: Learning to detect browser fingerprinting behaviors. In Proceedings of the 2021 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 24–27 May 2020; IEEE: Piscataway, NJ, USA, 2021; pp. 1143–1161. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.