Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches

被引:0
|
作者
Gruss, Daniel [1 ]
Spreitzer, Raphael [1 ]
Mangard, Stefan [1 ]
机构
[1] Graz Univ Technol, Graz, Austria
基金
欧盟地平线“2020”;
关键词
TIMING-ATTACK; IMPLEMENTATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent work on cache attacks has shown that CPU caches represent a powerful source of information leakage. However, existing attacks require manual identification of vulnerabilities, i.e., data accesses or instruction execution depending on secret information. In this paper, we present Cache Template Attacks. This generic attack technique allows us to profile and exploit cache based information leakage of any program automatically, without prior knowledge of specific software versions or even specific system information. Cache Template Attacks can be executed online on a remote system without any prior offline computations or measurements. Cache Template Attacks consist of two phases. In the profiling phase, we determine dependencies between the processing of secret information, e.g., specific key inputs or private keys of cryptographic primitives, and specific cache accesses. In the exploitation phase, we derive the secret values based on observed cache accesses. We illustrate the power of the presented approach in several attacks, but also in a useful application for developers. Among the presented attacks is the application of Cache Template Attacks to infer keystrokes and even more severe the identification of specific keys on Linux and Windows user interfaces. More specifically, for lower-case only passwords, we can reduce the entropy per character from log(2)(26) = 4.7 to 1.4 bits on Linux systems. Furthermore, we perform an automated attack on the T-table-based AES implementation of OpenSSL that is as efficient as state-of-the-art manual cache attacks.
引用
收藏
页码:897 / 912
页数:16
相关论文
共 50 条
  • [1] Spy Cartel: Parallelizing Evict+Time-Based Cache Attacks on Last-Level Caches
    Himanshi Jain
    D. Anthony Balaraju
    Chester Rebeiro
    Journal of Hardware and Systems Security, 2019, 3 (2) : 147 - 163
  • [2] Last-Level Cache Side-Channel Attacks are Practical
    Liu, Fangfei
    Yarom, Yuval
    Ge, Qian
    Heiser, Gernot
    Lee, Ruby B.
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 605 - 622
  • [3] CATalyst: Defeating Last-Level Cache Side Channel Attacks in Cloud Computing
    Liu, Fangfei
    Ge, Qian
    Yarom, Yuval
    Mckeen, Frank
    Rozas, Carlos
    Heiser, Gernot
    Lee, Ruby B.
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA-22), 2016, : 406 - 418
  • [4] Zero Inclusion Victim: Isolating Core Caches from Inclusive Last-level Cache Evictions
    Chaudhuri, Mainak
    2021 ACM/IEEE 48TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2021), 2021, : 71 - 84
  • [5] Exploiting Reuse Locality on Inclusive Shared Last-Level Caches
    Albericio, Jorge
    Ibanez, Pablo
    Vinals, Victor
    Maria Llaberia, Jose
    ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2013, 9 (04)
  • [6] Adaptive Cache Bypassing for Inclusive Last Level Caches
    Gupta, Saurabh
    Gao, Hongliang
    Zhou, Huiyang
    IEEE 27TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM (IPDPS 2013), 2013, : 1243 - 1253
  • [7] An Application-Aware Cache Replacement Policy for Last-Level Caches
    Warrier, Tripti S.
    Anupama, B.
    Mutyam, Madhu
    ARCHITECTURE OF COMPUTING SYSTEMS - ARCS 2013, 2013, 7767 : 207 - 219
  • [8] Combining Recency of Information with Selective Random and a Victim Cache in Last-Level Caches
    Valero, Alejandro
    Sahuquillo, Julio
    Petit, Salvador
    Lopez, Pedro
    Duato, Jose
    ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2012, 9 (03)
  • [9] SCIP: Selective Cache Insertion and Bypassing to Improve the Performance of Last-Level Caches
    Kharbutli, Mazen
    Jarrah, Moath
    Jararweh, Yaser
    2013 IEEE JORDAN CONFERENCE ON APPLIED ELECTRICAL ENGINEERING AND COMPUTING TECHNOLOGIES (AEECT), 2013,
  • [10] Last-level Cache Deduplication
    Tian, Yingying
    Khan, Samira M.
    Jimenez, Daniel A.
    Loh, Gabriel H.
    PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON SUPERCOMPUTING, (ICS'14), 2014, : 53 - 62