Side-Channel Attacks on Shared Search Indexes

被引:2
|
作者
Wang, Liang [1 ]
Grubbs, Paul [2 ]
Lu, Jiahui [3 ]
Bindschaedler, Vincent [4 ]
Cash, David [5 ]
Ristenpart, Thomas [2 ]
机构
[1] UW Madison, Madison, WI 53706 USA
[2] Cornell Tech, New York, NY USA
[3] SJTU, Shanghai, Peoples R China
[4] UIUC, Champaign, IL USA
[5] Rutgers State Univ, New Brunswick, NJ USA
关键词
side channels; SaaS security; elasticsearch;
D O I
10.1109/SP.2017.50
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Full-text search systems, such as Elasticsearch and Apache Solr, enable document retrieval based on keyword queries. In many deployments these systems are multi-tenant, meaning distinct users' documents reside in, and their queries are answered by, one or more shared search indexes. Large deployments may use hundreds of indexes across which user documents are randomly assigned. The results of a search query are filtered to remove documents to which a client should not have access. We show the existence of exploitable side channels in modern multi-tenant search. The starting point for our attacks is a decade-old observation that the TF-IDF scores used to rank search results can potentially leak information about other users' documents. To the best of our knowledge, no attacks have been shown that exploit this side channel in practice, and constructing a working side channel requires overcoming numerous challenges in real deployments. We nevertheless develop a new attack, called STRESS (Search Text RElevance Score Side channel), and in so doing show how an attacker can map out the number of indexes used by a service, obtain placement of a document within each index, and then exploit co-tenancy with all other users to (1) discover the terms in other tenants' documents or (2) determine the number of documents (belonging to other tenants) that contain a term of interest. In controlled experiments, we demonstrate the attacks on popular services such as GitHub and Xen. do. We conclude with a discussion of countermeasures.
引用
收藏
页码:673 / 692
页数:20
相关论文
共 50 条
  • [1] Protecting Shared Virtualized Environments against Cache Side-channel Attacks
    Albalawi, Abdullah
    Vassilakis, Vassilios G.
    Calinescu, Radu
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 507 - 514
  • [2] Temperature Impact on Remote Power Side-Channel Attacks on Shared FPGAs
    Glamocanin, Ognjen
    Bazaz, Hajira
    Payer, Mathias
    Stojilovic, Mirjana
    2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
  • [3] Thwarting Side-Channel Attacks
    Edwards, Chris
    COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 13 - 14
  • [4] Combined Side-Channel Attacks
    Elaabid, M. Abdelaziz
    Meynard, Olivier
    Guilley, Sylvain
    Danger, Jean-Luc
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 175 - 190
  • [5] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [6] Side-channel attacks on smartcards
    NGS Software
    Netw. Secur., 2006, 12 (18-20):
  • [7] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [8] Introduction to Side-Channel Attacks and Fault Attacks
    Li, Yang
    Chen, Mengting
    Wang, Jian
    2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575
  • [9] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [10] Shared FPGAs and the Holy Grail: Protections against Side-Channel and Fault Attacks
    Glamocanin, Ognjen
    Mahmoud, Dina G.
    Regazzoni, Francesco
    Stojilovic, Mirjana
    PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 1645 - 1650