Exploiting the microarchitectural leakage of prefetching activities for side-channel attacks

被引:4
|
作者
Xiao, Chong [1 ]
Tang, Ming [1 ]
Guilley, Sylvain [2 ,3 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan 430070, Peoples R China
[2] Secure IC SAS, F-75015 Paris, France
[3] Inst Polytech Paris, TELECOM Paris, F-91120 Paris, France
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Microarchitectural leakage; Hardware prefetcher; Reverse-engineer; Side-Channel Attack; AES; CACHE TIMING ANALYSIS;
D O I
10.1016/j.sysarc.2023.102877
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Microarchitectural optimizations are designed to maximize CPU usage from all aspects of instruction execution. While they effectively shorten the overall timing of execution by executing instructions or load data speculatively, observable traces, which can be used to infer sensitive information about programs on the fly, are left behind. The Instruction Pointer (IP) based stride prefetcher is implemented by Intel since Sandy Bridge, which uses sequential load history to determine whether to fetch additional lines in advance. Shin et al. (2018) discovered that lines near the lookup table are prefetched by the IP-based stride prefetcher, and they conducted side-channel attack on ECDH in face of constant-time algorithm. Their exploitation of prefetching leakage leverage secret bits which directly relate to prefetching themselves, hence such attacks cannot be applied to algorithms without bit-dependent control/data flow, e.g., AES. @We believe the potential of prefetching leakage is not fully explored as many details of prefetcher implementation are unrevealed. Understanding how the prefetching works will help us to construct more powerful attacks. Motivated by this, we reverse-engineer three prefetching rules of IP-based stride prefetcher. A novel side-channel attack to recover the secret key of AES-128 is proposed to exemplify the exploitation, in which 3 or 4 consecutive bytes of the secret key are inferred according to observed prefetching activities combined with our concluded rules. Other unknown bytes can be complemented one at a time iteratively with our complement method. Besides, we verify that little interference is introduced by delaying the probing phase. In that case, it is rather reasonable and practical to schedule probing after the entire encryption is completed, instead of the first round where attackers need to interrupt the execution of encryption. Based on the inference, our side-channel attack successfully recovered all bytes of the secret key of AES-128. The microarchitectural leakage of prefetching activities is proved to contribute in terms of direct sensitive information recovery when detailed prefetching mechanisms are offered.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography
    Lou, Xiaoxuan
    Zhang, Tianwei
    Jiang, Jun
    Zhang, Yinqian
    [J]. ACM COMPUTING SURVEYS, 2021, 54 (06)
  • [2] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    [J]. 39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [3] Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption
    Unterluggauer, Thomas
    Mangard, Stefan
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2016, 2016, 9689 : 3 - 18
  • [4] Side-Channel Attacks With Multi-Thread Mixed Leakage
    Gao, Yiwen
    Zhou, Yongbin
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 770 - 785
  • [5] XAI-Based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses
    Gulmezoglu, Berk
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 4039 - 4051
  • [6] Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model
    Oren, Yossef
    Renauld, Mathieu
    Standaert, Francois-Xavier
    Wool, Avishai
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2012, 2012, 7428 : 140 - 154
  • [7] Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
    Backes, Michael
    Koepf, Boris
    [J]. COMPUTER SECURITY - ESORIC 2008, PROCEEDINGS, 2008, 5283 : 517 - +
  • [8] Adversarial Black-Box Attacks with Timing Side-Channel Leakage
    Nakai, Tsunato
    Suzuki, Daisuke
    Omatsu, Fumio
    Fujino, Takeshi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (01) : 143 - 151
  • [9] Thwarting Side-Channel Attacks
    Edwards, Chris
    [J]. COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 13 - 14
  • [10] Combined Side-Channel Attacks
    Elaabid, M. Abdelaziz
    Meynard, Olivier
    Guilley, Sylvain
    Danger, Jean-Luc
    [J]. INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 175 - 190