CACHEQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software

被引:0
|
作者
Yuan, Yuanyuan [1 ]
Liu, Zhibo [1 ]
Wang, Shuai [1 ]
机构
[1] Hong Kong Univ Sci & Technol, Hong Kong, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cache side-channel attacks extract secrets by examining how victim software accesses cache. To date, practical attacks on cryptosystems and media libraries are demonstrated under different scenarios, inferring secret keys and reconstructing private media data such as images. This work first presents eight criteria for designing a full-fledged detector for cache side-channel vulnerabilities. Then, we propose CACHEQL, a novel detector that meets all of these criteria. CACHEQL precisely quantifies information leaks of binary code, by characterizing the distinguishability of logged side channel traces. Moreover, CACHEQL models leakage as a cooperative game, allowing information leakage to be precisely distributed to program points vulnerable to cache side channels. CACHEQL is meticulously optimized to analyze whole side channel traces logged from production software (where each trace can have millions of records), and it alleviates randomness introduced by cryptographic blinding, ORAM, or real-world noises. Our evaluation quantifies side-channel leaks of production cryptographic and media software. We further localize vulnerabilities reported by previous detectors and also identify a few hundred new leakage sites in recent OpenSSL (ver. 3.0.0), MbedTLS (ver. 3.0.0), Libgcrypt (ver. 1.9.4). Many of our localized program points are within the pre-processing modules of cryptosystems, which are not analyzed by existing works due to scalability. We also localize vulnerabilities in Libjpeg (ver. 2.1.2) that leak privacy about input images.
引用
收藏
页码:2009 / 2026
页数:18
相关论文
共 50 条
  • [1] Verifying and Quantifying Side-channel Resistance of Masked Software Implementations
    Gao, Pengfei
    Zhang, Jun
    Song, Fu
    Wang, Chao
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2019, 28 (03)
  • [2] Architecting against Software Cache-Based Side-Channel Attacks
    Kong, Jingfei
    Aciicmez, Onur
    Seifert, Jean-Pierre
    Zhou, Huiyang
    IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (07) : 1276 - 1288
  • [3] Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity
    Crane, Stephen
    Homescu, Andrei
    Brunthaler, Stefan
    Larsen, Per
    Franz, Michael
    22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [4] Testing Cache Side-channel Leakage
    Basu, Tiyash
    Chattopadhyay, Sudipta
    10TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS - ICSTW 2017, 2017, : 51 - 60
  • [5] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [6] Analyzing Side-Channel Attack Vulnerabilities at RTL
    Lai, Xinhui
    Jenihhin, Maksim
    2023 IEEE 24TH LATIN AMERICAN TEST SYMPOSIUM, LATS, 2023,
  • [7] Symbolic Verification of Cache Side-Channel Freedom
    Chattopadhyay, Sudipta
    Roychoudhury, Abhik
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (11) : 2812 - 2823
  • [8] High-Level Simulation of Embedded Software Vulnerabilities to EM Side-Channel Attacks
    Thimmaiah, Aditya
    Iyer, Vishnuvardhan V.
    Gerstlauer, Andreas
    Orshansky, Michael
    EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, SAMOS 2022, 2022, 13511 : 155 - 170
  • [9] Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis
    Kifayat, Kashif
    Merabti, Madjid
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 138 - 146
  • [10] Quantitative Masking Strength: Quantifying the Power Side-Channel Resistance of Software Code
    Eldib, Hassan
    Wang, Chao
    Taha, Mostafa
    Schaumont, Patrick
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2015, 34 (10) : 1558 - 1568