Skip to main content
Amit Klein's security corner

Main menu

  • Academia-related
  • Advanced web application attacks
  • DNS X-Ray
  • DNS cache poisoning
  • Home
  • Predictable Javascript Math.Random and HTTP multipart boundary string
  • Public appearances
  • Recent (non-Academic) Research
  • Standards, community, etc.
  • Usenix 2019 *extended* paper
  • Web application security - the early days
  • Web-based virtual machine detection
  • XML and SOAP attacks

You are here

Home

Blog

  • BlackHat and DefCon 2017
  • Black Hat USA 2016
  • Perfect exflitration slides
  • HTTP Response Splitting in Node.js
  • Web-based VM detection with HTML5
  • (NIH) WebRTC exposes internal IP addresses

Performance

Web-based virtual machine detection using the HTML5 Performance object

Submitted by amit on Mon, 05/10/2015 - 16:37

Multiple browsers (Microsoft Edge, Microsoft Internet Explorer, Mozilla Firefox) Performance object leaks the Windows performance counter frequency (equivalent to physical CPU clock speed or virtual machine detection)

 

Advisory

Amit Klein

 

Tags:

  • VM
  • HTML5
  • Performance
  • windows performance counter
  • Read more about Web-based virtual machine detection using the HTML5 Performance object
Subscribe to RSS - Performance

Advisories

  • HTTP Response Splitting in Node.js
  • Web-based VM detection with HTML5 Performance Object
  • Safari PASV vulnerability
  • The "localhosed" attack - stealing IE local cookies
  • Filezilla FTP server advisory