Fish and Chips: On the Root Causes of Co-Located Website-Fingerprinting Attacks
Summary
This research identifies how microarchitectural website-fingerprinting attacks (timing-based methods where attackers on the same computer can learn what websites a victim visits) actually work by pinpointing four main sources of information leakage: core contention (competition for processor cores), interrupts (signals that pause processing), frequency scaling (changing processor speed), and cache eviction (removing data from fast memory). The researchers developed a framework to measure how much each leakage source contributes to these attacks and demonstrated that controlling these sources can prevent the attacks entirely.
Solution / Mitigation
The source demonstrates that leakage can be 'completely mitigated by controlling these sources' (core contention, interrupts, frequency scaling, and cache eviction), but does not specify the concrete technical steps, configuration changes, or software updates needed to implement such controls in practice.
Classification
Original source: http://ieeexplore.ieee.org/document/11189044
First tracked: February 12, 2026 at 02:50 PM
Classified by LLM (prompt v3) · confidence: 95%