The Risks of WebGL: Analysis, Evaluation and Detection
Department of Electrical Engineering, Technion University, Haifa, Israel
arXiv:1904.13071 [cs.CR], (30 Apr 2019)
@article{belkin2019risks,
title={The Risks of WebGL: Analysis, Evaluation and Detection},
author={Belkin, Alex and Gelernter, Nethanel and Cidon, Israel},
year={2019},
eprint={1904.13071},
archivePrefix={arXiv},
primaryClass={cs.CR}
}
WebGL is a browser feature that enables JavaScript-based control of the graphics processing unit (GPU) to render interactive 3D and 2D graphics, without the use of plug-ins. Exploiting WebGL for attacks will affect billions of users since browsers serve as the main interaction mechanism with the world wide web. This paper explores the potential threats derived from the recent move by browsers from WebGL 1.0 to the more powerful WebGL 2.0. We focus on two possible abuses of this feature: distributed password cracking and distributed cryptocurrency mining. Our evaluation of the attacks also includes the practical aspects of successful attacks, such as stealthiness and user-experience. Considering the danger of WebGL abuse, as observed in the experiments, we designed and evaluated a proactive defense. We implemented a Chrome extension that proved itself effective in detecting and blocking WebGL. We demonstrate in our experiments the major improvements of WebGL 2.0 over WebGL 1.0 both in performance and in convenience. Furthermore, our results show that it is possible to use WebGL 2.0 in distributed attacks under real-world conditions. Although WebGL 2.0 shows similar hash rates as CPU-based techniques, WebGL 2.0 proved to be significantly harder to detect and has a lesser effect on user experience.
May 1, 2019 by hgpu