The Risks of WebGL: Analysis, Evaluation and Detection

04/30/2019
by   Alex Belkin, et al.
0

WebGL is a browser feature that enables JavaScript-based control of the graphics processing unit (GPU) to render interactive 3D and 2D graphics, without the use of plug-ins. Exploiting WebGL for attacks will affect billions of users since browsers serve as the main interaction mechanism with the world wide web. This paper explores the potential threats derived from the recent move by browsers from WebGL 1.0 to the more powerful WebGL 2.0. We focus on two possible abuses of this feature: distributed password cracking and distributed cryptocurrency mining. Our evaluation of the attacks also includes the practical aspects of successful attacks, such as stealthiness and user-experience. Considering the danger of WebGL abuse, as observed in the experiments, we designed and evaluated a proactive defense. We implemented a Chrome extension that proved itself effective in detecting and blocking WebGL. We demonstrate in our experiments the major improvements of WebGL 2.0 over WebGL 1.0 both in performance and in convenience. Furthermore, our results show that it is possible to use WebGL 2.0 in distributed attacks under real-world conditions. Although WebGL 2.0 shows similar hash rates as CPU-based techniques, WebGL 2.0 proved to be significantly harder to detect and has a lesser effect on user experience.

READ FULL TEXT

page 7

page 10

research
08/03/2018

Security protocols for distributed wireless sensor networks

Sensor Networks technologies had proved their great practicability in th...
research
12/10/2021

GPU-accelerated image alignment for object detection in industrial applications

This research proposes a practical method for detecting featureless obje...
research
07/02/2023

New intelligent defense systems to reduce the risks of Selfish Mining and Double-Spending attacks using Learning Automata

In this paper, we address the critical challenges of double-spending and...
research
02/05/2021

Security Assessment and Impact Analysis of Cyberattacks in Integrated T D Power Systems

In this paper, we examine the impact of cyberattacks in an integrated tr...
research
12/10/2018

On legitimate mining of cryptocurrency in the browser - a feasibility study

Cryptocurrency mining in the browser has the potential to provide a new ...
research
03/28/2019

Implementing Noise with Hash functions for Graphics Processing Units

We propose a modification to Perlin noise which use computable hash func...
research
12/26/2012

Computer-Assisted Interactive Documentary and Performance Arts in Illimitable Space

This major component of the research described in this thesis is 3D comp...

Please sign up or login with your details

Forgot password? Click here to reset