Prefix Siphoning: Exploiting LSM-Tree Range Filters For Information Disclosure

被引:0
|
作者
Kaufman, Adi [1 ]
Hershcovitch, Moshik [1 ,2 ]
Morrison, Adam [1 ]
机构
[1] Tel Aviv Univ, Tel Aviv, Israel
[2] IBM Res, Tel Aviv, Israel
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Key-value stores typically leave access control to the systems for which they act as storage engines. Unfortunately, attackers may circumvent such read access controls via timing attacks on the key-value store, which use differences in query response times to glean information about stored data. To date, key-value store timing attacks have aimed to disclose stored values and have exploited external mechanisms that can be disabled for protection. In this paper, we point out that key disclosure is also a security threat-and demonstrate key disclosure timing attacks that exploit mechanisms of the key-value store itself. We target LSM-tree based key-value stores utilizing range filters, which have been recently proposed to optimize LSM-tree range queries. We analyze the impact of the range filters SuRF and prefix Bloom filter on LSM-trees through a security lens, and show that they enable a key disclosure timing attack, which we call prefix siphoning. Prefix siphoning successfully leverages benign queries for non-present keys to identify prefixes of actual keys-and in some cases, full keys-in scenarios where brute force searching for keys (via exhaustive enumeration or random guesses) is infeasible.
引用
收藏
页码:719 / 733
页数:15
相关论文
共 2 条
  • [1] MDCF: Multiple Dynamic Cuckoo Filters for LSM-Tree
    Yao, Xingfei
    Xie, Taotao
    Chen, Xiaowei
    Shen, Zhaoyan
    Cai, Xiaojun
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2023, PT VI, 2024, 14492 : 202 - 218
  • [2] BIVXDB: A Bottom Information Invert Index to Speed up the Query Performance of LSM-Tree
    Yao, Zekun
    Zhou, Jiang
    Fan, Zhixin
    Shan, Licheng
    Yue, Yinliang
    Song, Yang
    WEB AND BIG DATA, APWEB-WAIM 2024, PT IV, 2024, 14964 : 19 - 34