
USENIX Association 25th USENIX Security Symposium 479
not susceptible to clock-edge techniques, protecting tim-
ing information.
Fuzzyfox requires a number of engineering improve-
ments before it is ready to deploy to users, but it has
proved that the fuzzy time concept can be applied to
browsers. Notably, more experiments with setting chan-
nel bandwidth and exposing such settings to users need to
be performed. Additionally, Fuzzyfox does not hook in-
bound network events, which a cooperating server could
use to derive the duration of events in Fuzzyfox. Other
interfaces (WebSockets, WebAudio, other media APIs)
should be investigated for behavior that would break the
Fuzzyfox design. We expect that with these changes
Fuzzyfox could be adapted for use in projects like Tor
Browser and protect real users against timing attacks.
Acknowledgements
We thank Kyle Huey, Patrick McManus, Eric Rescorla,
and Martin Thomson at Mozilla for helpful discussions
about this work, and for sharing their insights with us
about Firefox internals. We are also grateful to Keaton
Mowery and Mike Perry for helpful discussions, and
to our anonymous reviewers and to David Wagner, our
shepherd, for their detailed comments.
We additionally thank Nina Chen for assistance with
editing and graph design.
This material is based upon work supported by
the National Science Foundation under Grants No.
1228967 and 1514435, and by a gift from Mozilla.
References
[1] M. Andrysco, D. Kohlbrenner, K. Mowery, R. Jhala,
S. Lerner, and H. Shacham, “On subnormal floating
point and abnormal timing,” in Proceedings of IEEE
Security and Privacy (“Oakland”) 2015, L. Bauer and
V. Shmatikov, Eds. IEEE Computer Society, May 2015.
[2] A. Aviram, S. Hu, B. Ford, and R. Gummadi, “Determi-
nating timing channels in compute clouds,” in Proceed-
ings of CCSW 2010, A. Perrig and R. Sion, Eds. ACM
Press, Oct. 2010.
[3] D. Cock, Q. Ge, T. Murray, and G. Heiser, “The last mile:
An empirical study of timing channels on seL4,” in Pro-
ceedings of CCS 2014, M. Yung and N. Li, Eds. ACM
Press, Nov. 2014, pp. 570–81.
[4] B. Ford, “Plugging side-channel leaks with timing infor-
mation flow control,” in Proceedings of HotCloud 2012,
R. Fonseca and D. Maltz, Eds. USENIX, Jun. 2012.
[5] J. W. Gray, “On analyzing the bus-contention channel un-
der fuzzy time,” in Proceedings of CSFW 1993, C. Mead-
ows, Ed. IEEE Computer Society, Jun. 1993, pp. 3–9.
[6] ——, “Countermeasures and tradeoffs for a class of
covert timing channels,” Hong Kong University of Sci-
ence and Technology, Tech. Rep. HKUST-CS94-18,
1994, online: http://hdl.handle.net/1783.1/25.
[7] ——, “On introducing noise into the bus-contention
channel,” in Proceedings of IEEE Security and Privacy
(“Oakland”) 1993, R. Kemmerer and J. Rushby, Eds.
IEEE Computer Society, May 1993, pp. 90–98.
[8] L. T. Hansen, “ECMAScript shared memory and atom-
ics,” Online: http://tc39.github.io/ecmascript_sharedm
em/shmem.html, Feb. 2016.
[9] W.-M. Hu, “Reducing timing channels with fuzzy time,”
J. Computer Security, vol. 1, no. 3-4, pp. 233–54, 1992.
[10] ——, “Reducing timing channels with fuzzy time,” in
Proceedings of IEEE Security and Privacy (“Oakland”)
1991, T. F. Lunt and J. McLean, Eds. IEEE Computer
Society, May 1991, pp. 8–20.
[11] P. A. Karger, M. E. Zurko, D. W. Bonin, A. H. Mason,
and C. E. Kahn, “A VMM security kernel for the VAX ar-
chitecture,” in Proceedings of IEEE Security and Privacy
(“Oakland”) 1990, D. M. Cooper and T. F. Lunt, Eds.
IEEE Computer Society, May 1990, pp. 2–19.
[12] ——, “A retrospective on the VAX VMM security ker-
nel,” IEEE Trans. Software Engineering, vol. 17, no. 11,
pp. 1147–65, Nov. 1991.
[13] P. Li, D. Gao, and M. K. Reiter, “Mitigating access-driven
timing channels in clouds using StopWatch,” in Proceed-
ings of DSN 2013, G. Candea, Ed. IEEE/IFIP, Jun. 2013.
[14] ——, “StopWatch: A cloud architecture for timing chan-
nel mitigation,” ACM Trans. Info. & System Security,
vol. 17, no. 2, Nov. 2014.
[15] S. Lipner, T. Jaeger, and M. E. Zurko, “Lessons from
VAX/SVS for high-assurance VM systems,” IEEE Secu-
rity & Privacy, vol. 10, no. 6, pp. 26–35, Nov.–Dec. 2012.
[16] S. B. Lipner, “A comment on the confinement problem,”
ACM SIGOPS Operating Systems Review, vol. 9, no. 5,
pp. 192–96, Nov. 1975.
[17] R. Martin, J. Demme, and S. Sethumadhavan, “Time-
Warp: Rethinking timekeeping and performance moni-
toring mechanisms to mitigate side-channel attacks,” in
Proceedings of ISCA 2012, J. Torrellas, Ed. ACM Press,
Jun. 2012, pp. 118–29.
[18] Mozilla, “Javascript concurrency model and event loop,”
2016, online: https://developer.mozilla.org/en-US/docs/
Web/JavaScript/EventLoop#Run-to-completion.
[19] Y. Oren, V. P. Kemerlis, S. Sethumadhavan, and A. D.
Keromytis, “The spy in the sandbox: Practical cache at-
tacks in JavaScript and their implications,” in Proceed-
ings of CCS 2015, C. Kruegel and N. Li, Eds. ACM
Press, Oct. 2015.
[20] M. Perry, “Tor browser 4.5 is released,” Apr. 2015, online:
https://blog.torproject.org/blog/tor-browser-45-released.