Slide 22
Slide 22 text
@mathias
“HEIST is a set of techniques that exploit timing side-channels in the
browser […] to determine whether a response fitted into a single TCP
window or whether it needed multiple. […] an attacker can determine
the exact amount of bytes that were needed to send the response back
to the client, all from within the browser. It so happens to be that
knowing the exact size of a cross-origin resource is just what you need to
launch a compression-based attack, which can be used to extract
content (e.g. CSRF tokens) from any website using gzip compression.”