
Acknowledgment
We would like to thank our shepherd, Ben Stock, and anony-
mous reviewers for their helpful comments and feedback. This
work was supported in part by National Science Foundation
(NSF) grant CNS-18-12870 and an Amazon Research Award.
The views and conclusions contained herein are those of the
authors and should not be interpreted as necessarily represent-
ing the official policies or endorsements, either expressed or
implied, of NSF or Amazon.
References
[1] Canvas defender. https://multiloginapp.com/
canvasdefender-browser- extension/.
[2] Google maps meets webgl. https://www.youtube.com/watch?v=X3EO_
zehMkM.
[3] Hwmonitor—voltages, temperatures and fans speed monitoring. https://www.
cpuid.com/softwares/hwmonitor.html.
[4] Issue 793217: “document_start" hook on child frames should fire before control
is returned to the parent frame. https://bugs.chromium.org/p/chromium/
issues/detail?id=793217.
[5] Multilogin. https://multilogin.com/.
[6] Pagespeed module: open-source server modules that optimize your site automat-
ically. https://developers.google.com/speed/pagespeed/module/.
[7] Reduce resolution of performance.now to prevent timing attacks. https://bugs.
chromium.org/p/chromium/issues/detail?id=506723.
[8] Shape security. https://www.shapesecurity.com/.
[9] Trackoff privacy software. https://www.trackoff.com/en.
[10] Webgl games. https://www.crazygames.com/t/webgl.
[11] [wikipedia] back-face culling. https://en.wikipedia.org/wiki/
Back-face_culling.
[12] Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind
Narayanan, and Claudia Diaz. The web never forgets: Persistent tracking mech-
anisms in the wild. In Proceedings of the 2014 ACM SIGSAC Conference on
Computer and Communications Security, CCS ’14, pages 674–689, New York,
NY, USA, 2014. ACM.
[13] Gunes Acar, Marc Juarez, Nick Nikiforakis, Claudia Diaz, Seda Gürses, Frank
Piessens, and Bart Preneel. FPDetective: Dusting the web for fingerprinters. In
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communi-
cations Security, CCS ’13, pages 1129–1140, 2013.
[14] Marc Andrysco, Andres Nötzli, Fraser Brown, Ranjit Jhala, and Deian Stefan.
Towards verified, constant-time floating point operations. In Proceedings of
the 2018 ACM SIGSAC Conference on Computer and Communications Security,
CCS ’18, pages 1369–1382, New York, NY, USA, 2018. ACM.
[15] Amittai Aviram, Sen Hu, Bryan Ford, and Ramakrishna Gummadi. Determi-
nating timing channels in compute clouds. In Proceedings of the 2010 ACM
Workshop on Cloud Computing Security Workshop, CCSW ’10, pages 103–108,
New York, NY, USA, 2010. ACM.
[16] Andrew Bortz and Dan Boneh. Exposing private information by timing web
applications. In Proceedings of the 16th International Conference on World Wide
Web, WWW ’07, pages 621–628, New York, NY, USA, 2007. ACM.
[17] Pablo Buiras, Amit Levy, Deian Stefan, Alejandro Russo, and DavidMazieres. A
library for removing cache-based attacks in concurrent information flow systems.
In International Symposium on Trustworthy Global Computing, pages 199–216.
Springer, 2013.
[18] Yinzhi Cao, Zhanhao Chen, Song Li, and Shujiang Wu. Deterministic browser.
In Proceedings of the 23rd ACM SIGSAC Conference on Computer and Commu-
nications Security, CCS ’17, 2017.
[19] Yinzhi Cao, Song Li, and Erik Wijmans. (cross-)browser fingerprinting via os
and hardware level features. In Annual Network and Distributed System Security
Symposium, NDSS, 2017.
[20] Steven Englehardt and Arvind Narayanan. Online tracking: A 1-million-site mea-
surement and analysis. In Proceedings of the 22Nd ACM SIGSAC Conference on
Computer and Communications Security, CCS ’16, 2016.
[21] Ulfar Erlingsson and Fred B Schneider. Irm enforcement of java stack inspection.
In IEEE S&P, 2000.
[22] Edward W. Felten and Michael A. Schneider. Timing attacks on web privacy.
In Proceedings of the 7th ACM Conference on Computer and Communications
Security, CCS ’00, pages 25–32, New York, NY, USA, 2000. ACM.
[23] David Fifield and Serge Egelman. Fingerprinting web users through font metrics.
In Financial Cryptography and Data Security, pages 107–124. Springer, 2015.
[24] Ben Gras, Kaveh Razavi, Erik Bosman, Herbert Bos, and Cristiano Giuffrida.
Aslr on the line: Practical cache attacks on the mmu. In Annual Network and
Distributed System Security Symposium, NDSS, 2017.
[25] Ralf Hund, Carsten Willems, and Thorsten Holz. Practical timing side channel
attacks against kernel space aslr. In Proceedings of the 2013 IEEE Symposium
on Security and Privacy, SP ’13, pages 191–205, Washington, DC, USA, 2013.
IEEE Computer Society.
[26] Darius Kazemi. Counting uniforms in webgl. https://bocoup.com/blog/
counting-uniforms- in-webgl.
[27] Emre Kiciman and Benjamin Livshits. Ajaxscope: a platform for remotely mon-
itoring the client-side behavior of web 2.0 applications. In SIGOPS, 2007.
[28] Paul C. Kocher. Timing attacks on implementations of diffie-hellman, rsa, dss,
and other systems. In Proceedings of the 16th Annual International Cryptology
Conference on Advances in Cryptology, CRYPTO ’96, pages 104–113, London,
UK, UK, 1996. Springer-Verlag.
[29] David Kohlbrenner and Hovav Shacham. On the effectiveness of mitigations
against floating-point timing channels. In 26th USENIX Security Symposium,
USENIX Security 2017, Vancouver, BC, Canada, August 16-18, 2017., pages 69–
81, 2017.
[30] Balachander Krishnamurthy, Konstantin Naryshkin, and Craig Wills. Privacy
leakage vs. protection measures: the growing disconnect. In Web 2.0 Security
and Privacy Workshop, 2011.
[31] Balachander Krishnamurthy and Craig Wills. Privacy diffusion on the web: a
longitudinal perspective. In Proceedings of the 18th international conference on
World wide web, pages 541–550. ACM, 2009.
[32] Balachander Krishnamurthy and Craig E Wills. Generating a privacy footprint on
the internet. In Proceedings of the 6th ACM SIGCOMM conference on Internet
measurement, pages 65–70. ACM, 2006.
[33] Balachander Krishnamurthy and Craig E Wills. Characterizing privacy in online
social networks. In Proceedings of the first workshop on Online social networks,
pages 37–42. ACM, 2008.
[34] Pierre Laperdrix, Walter Rudametkin, and Benoit Baudry. Beauty and the beast:
Diverting modern web browsers to build unique browser fingerprints. In 37th
IEEE Symposium on Security and Privacy (S&P 2016), 2016.
[35] Adam Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roes-
ner. Internet jones and the raiders of the lost trackers: An archaeological study of
web tracking from 1996 to 2016. In 25th USENIX Security Symposium (USENIX
Security 16), Austin, TX, 2016.
[36] Peng Li, Debin Gao, and Michael K. Reiter. Mitigating access-driven timing
channels in clouds using stopwatch. In 2013 43rd Annual IEEE/IFIP Interna-
tional Conference on Dependable Systems and Networks (DSN), Budapest, Hun-
gary, June 24-27, 2013, pages 1–12, 2013.
[37] Peng Li, Debin Gao, and Michael K. Reiter. Stopwatch: A cloud architecture for
timing channel mitigation. ACM Trans. Inf. Syst. Secur., 17(2):8:1–8:28, Novem-
ber 2014.
[38] Zhichun Li, Yi Tang, Yinzhi Cao, Vaibhav Rastogi, Yan Chen, Bin Liu, and Clint
Sbisa. Webshield: Enabling various web defense techniques without client side
modifications. In NDSS, 2011.
USENIX Association 28th USENIX Security Symposium 1659