ThermalBleed: A Practical Thermal Side-Channel Attack

被引:5
|
作者
Kim, Taehun [1 ]
Shin, Youngjoo [1 ]
机构
[1] Korea Univ, Sch Cybersecur, Seoul 02841, South Korea
关键词
Thermal analysis; Temperature sensors; Side-channel attacks; Monitoring; Temperature measurement; Linux; Kernel; Breaking KASLR; digital thermal sensor; thermal side-channel attack;
D O I
10.1109/ACCESS.2022.3156596
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern OSs expose an interface for monitoring CPU temperature to unprivileged users for effective user decision-based thermal management. Due to the low sampling rate and resolution, thermal sensors have generally been restricted to the construction of covert channels. However, exposing the thermal interface to unprivileged users may be problematic, because the heat emission inside a CPU core is affected by program execution on the core; an attacker may be able to infer the secret information of the program by exploiting the thermal interface as a side-channel. In this paper, we extensively analyze digital thermal sensors in Intel CPUs and show that it is possible to implement a software-based thermal side-channel attack. Specifically, by analyzing some properties of the thermal sensors, we inferred that the thermal sensor makes it possible to distinguish between a cache hit and a physical memory access in memory load operations. Based on the analysis results, we implement ThermalBleed, a thermal side-channel attack that breaks kernel address space layout randomization (KASLR) in Linux systems. Moreover, by conducting an in-depth analysis, we identify useful hidden properties of the Intel thermal sensors. Our analysis establishes a stepping stone to build a more precise and effective thermal side-channel attack in the future. To the best of our knowledge, this is the first work that extends a thermal covert channel to a practical side-channel attack by exploring the properties of Intel digital thermal sensors.
引用
收藏
页码:25718 / 25731
页数:14
相关论文
共 50 条
  • [1] Practical side-channel attack on a security device
    San Pedro, Manuel
    Servant, Victor
    Guillemet, Charles
    [J]. 31ST INTERNATIONAL CONFERENCE ON MICROELECTRONICS (IEEE ICM 2019), 2019, : 130 - 133
  • [2] POSTER: Is Active Electromagnetic Side-channel Attack Practical?
    Wakabayashi, Satohiro
    Maruyama, Seita
    Mori, Tatsuya
    Goto, Shigeki
    Kinugawa, Masahiro
    Hayashi, Yu-ichi
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2587 - 2589
  • [3] Practical Side-Channel Attack on Message Encoding in Masked Kyber
    Wang, Jian
    Cao, Weigiong
    Chen, Hua
    Li, Haoyuan
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 882 - 889
  • [4] Side-channel attack pitfalls
    Tiri, Kris
    [J]. 2007 44TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, VOLS 1 AND 2, 2007, : 15 - 20
  • [5] A Practical Side-Channel Attack of a LoRaWAN Module Using Deep Learning
    Xu, Jiming
    Tang, You
    Wang, Yujian
    Wang, Xin'an
    [J]. PROCEEDINGS OF 2019 IEEE 13TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (IEEE-ASID'2019), 2019, : 17 - 21
  • [6] Side-channel trojan insertion - A practical foundry-side attack via ECO
    Perez, Tiago Diadami
    Imran, Malik
    Vaz, Pablo
    Pagliarini, Samuel
    [J]. arXiv, 2021,
  • [7] Side-Channel Trojan Insertion - a Practical Foundry-Side Attack via ECO
    Perez, Tiago
    Imran, Malik
    Vaz, Pablo
    Pagliarini, Samuel
    [J]. 2021 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2021,
  • [8] SIDE-CHANNEL ATTACK ON THE HUMANAUTH CAPTCHA
    Javier Hernandez-Castro, Carlos
    Ribagorda, Arturo
    Saez, Yago
    [J]. SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 59 - 65
  • [9] Side-channel attack on substitution blocks
    Novak, R
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 307 - 318
  • [10] USB side-channel attack on Tor
    Yang, Qing
    Gasti, Paolo
    Balagani, Kiran
    Li, Yantao
    Zhou, Gang
    [J]. COMPUTER NETWORKS, 2018, 141 : 57 - 66