Side-Channel Attacks on Shared Search Indexes

被引:2
|
作者
Wang, Liang [1 ]
Grubbs, Paul [2 ]
Lu, Jiahui [3 ]
Bindschaedler, Vincent [4 ]
Cash, David [5 ]
Ristenpart, Thomas [2 ]
机构
[1] UW Madison, Madison, WI 53706 USA
[2] Cornell Tech, New York, NY USA
[3] SJTU, Shanghai, Peoples R China
[4] UIUC, Champaign, IL USA
[5] Rutgers State Univ, New Brunswick, NJ USA
关键词
side channels; SaaS security; elasticsearch;
D O I
10.1109/SP.2017.50
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Full-text search systems, such as Elasticsearch and Apache Solr, enable document retrieval based on keyword queries. In many deployments these systems are multi-tenant, meaning distinct users' documents reside in, and their queries are answered by, one or more shared search indexes. Large deployments may use hundreds of indexes across which user documents are randomly assigned. The results of a search query are filtered to remove documents to which a client should not have access. We show the existence of exploitable side channels in modern multi-tenant search. The starting point for our attacks is a decade-old observation that the TF-IDF scores used to rank search results can potentially leak information about other users' documents. To the best of our knowledge, no attacks have been shown that exploit this side channel in practice, and constructing a working side channel requires overcoming numerous challenges in real deployments. We nevertheless develop a new attack, called STRESS (Search Text RElevance Score Side channel), and in so doing show how an attacker can map out the number of indexes used by a service, obtain placement of a document within each index, and then exploit co-tenancy with all other users to (1) discover the terms in other tenants' documents or (2) determine the number of documents (belonging to other tenants) that contain a term of interest. In controlled experiments, we demonstrate the attacks on popular services such as GitHub and Xen. do. We conclude with a discussion of countermeasures.
引用
收藏
页码:673 / 692
页数:20
相关论文
共 50 条
  • [31] On the Feasibility of Side-Channel Attacks in a Virtualized Environment
    Vateva-Gurova, Tsvetoslava
    Luna, Jesus
    Pellegrino, Giancarlo
    Suri, Neeraj
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 319 - 339
  • [32] Wireless Charging Power Side-Channel Attacks
    La Cour, Alexander S.
    Afridi, Khurram K.
    Suh, G. Edward
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 651 - 665
  • [33] Improved side-channel collision attacks on AES
    Bogdanov, Andrey
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 84 - 95
  • [34] Beyond the CPU: Side-Channel Attacks on GPUs
    Naghibijouybari, Hoda
    Neupane, Ajaya
    Qian, Zhiyun
    Abu-Ghazaleh, Nael
    IEEE DESIGN & TEST, 2021, 38 (03) : 15 - 21
  • [35] On the Challenges of Detecting Side-Channel Attacks in SGX
    Jiang, Jianyu
    Soriente, Claudio
    Karame, Ghassan
    PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022, 2022, : 86 - 98
  • [36] Acoustic Side-Channel Attacks on a Computer Mouse
    Conti, Mauro
    Duroyon, Marin
    Orazi, Gabriele
    Tsudik, Gene
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2024, 2024, 14828 : 44 - 63
  • [37] Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis
    Kifayat, Kashif
    Merabti, Madjid
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 138 - 146
  • [38] SonarSnoop: active acoustic side-channel attacks
    Peng Cheng
    Ibrahim Ethem Bagci
    Utz Roedig
    Jeff Yan
    International Journal of Information Security, 2020, 19 : 213 - 228
  • [39] Remote Side-Channel Attacks on Heterogeneous SoC
    Gravellier, Joseph
    Dutertre, Jean-Max
    Teglia, Yannick
    Moundi, Philippe Loubet
    Olivier, Francis
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 109 - 125
  • [40] Enhanced Side-Channel Cube Attacks on PRESENT
    Zhao, Xinjie
    Guo, Shize
    Zhang, Fan
    Wang, Tao
    Shi, Zhijie
    Luo, Hao
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 332 - 339