Practical Timing Side-Channel Attacks on Memory Compression

被引:1
|
作者
Schwarzl, Martin [1 ]
Borrello, Pietro [2 ]
Saileshwar, Gururaj [3 ]
Mueller, Hanna [1 ]
Schwarz, Michael [4 ]
Gruss, Daniel [1 ]
机构
[1] Graz Univ Technol, Graz, Austria
[2] Sapienza Univ Rome, Rome, Italy
[3] NVIDIA Res, Santa Clara, CA USA
[4] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
关键词
D O I
10.1109/SP46215.2023.10179297
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Compression algorithms have side channels due to their data-dependent operations. So far, only the compressionratio side channel was exploited, e.g., the compressed data size. In this paper, we present Decomp+Time, the first memorycompression attack exploiting a timing side channel in compression algorithms. While Decomp+Time affects a much broader set of applications than prior work. A key challenge is precisely crafting attacker-controlled compression payloads to enable the attack with sufficient resolution. Our evolutionary fuzzer, Comprezzor, finds effective Decomp+Time payloads that optimize latency differences such that decompression timing can even be exploited in remote attacks. Decomp+Time has a capacity of 9:73 kB=s locally, and 10:72 bit=min across the internet (14 hops). Using Comprezzor, we develop attacks that leak data bytewise in four different case studies: First, we leak 1:50 bit=min from Memcached on a remote PHP script. Second, we leak database records with 2:69 bit=min, from PostgreSQL in a Python-Flask application, over the internet. Third, we leak secrets with 49:14 bit=min locally from ZRAM-compressed pages on Linux. Fourth, we leak internal heap pointers from the V8 engine within the Google Chrome browser on a system using ZRAM. Thus, it is important to re-evaluate the use of compression on sensitive data even if the application is only reachable via a remote interface.
引用
收藏
页码:1186 / 1203
页数:18
相关论文
共 50 条
  • [1] Side-Channel Attacks on Optane Persistent Memory
    Liu, Sihang
    Kanniwadi, Suraaj
    Schwarzl, Martin
    Kogler, Andreas
    Gruss, Daniel
    Khan, Samira
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6807 - 6824
  • [2] Timing Side-channel Attacks and Countermeasures in CPU Microarchitectures
    Zhang, Jiliang
    Chen, Congcong
    Cui, Jinhua
    Li, Keqin
    ACM COMPUTING SURVEYS, 2024, 56 (07)
  • [3] Practical Algebraic Side-Channel Attacks Against ACORN
    Adomnicai, Alexandre
    Masson, Laurent
    Fournier, Jacques J. A.
    INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 325 - 340
  • [4] Entropy-Shield:Side-Channel Entropy Maximization for Timing-based Side-Channel Attacks
    Dhavlle, Abhijitt
    Mehta, Raj
    Rafatirad, Setareh
    Homayoun, Houman
    Dinakarrao, Sai Manoj Pudukotai
    PROCEEDINGS OF THE TWENTYFIRST INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2020), 2020, : 161 - 166
  • [5] A Memory Hierarchy Protected against Side-Channel Attacks
    Talaki, Ezinam Bertrand
    Savry, Olivier
    Bouvier Des Noes, Mathieu
    Hely, David
    CRYPTOGRAPHY, 2022, 6 (02)
  • [6] GPU Acceleration of RSA is Vulnerable to Side-channel Timing Attacks
    Luo, Chao
    Fei, Yunsi
    Kaeli, David
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [7] Exploring Timing Side-channel Attacks on Path-ORAMs
    Bao, Chongxi
    Srivastava, Ankur
    2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 68 - 73
  • [8] Practical Side-Channel Attacks against WPA-TKIP
    Schepers, Domien
    Ranganathan, Aanjhan
    Vanhoef, Mathy
    PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 415 - 426
  • [9] Protecting Encrypted Cookies from Compression Side-Channel Attacks
    Alawatugoda, Janaka
    Stebila, Douglas
    Boyd, Colin
    Financial Cryptography and Data Security (FC 2015), 2015, 8975 : 86 - 106
  • [10] Last-Level Cache Side-Channel Attacks are Practical
    Liu, Fangfei
    Yarom, Yuval
    Ge, Qian
    Heiser, Gernot
    Lee, Ruby B.
    2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, : 605 - 622