Practical Timing Side-Channel Attacks on Memory Compression

被引:1
|
作者
Schwarzl, Martin [1 ]
Borrello, Pietro [2 ]
Saileshwar, Gururaj [3 ]
Mueller, Hanna [1 ]
Schwarz, Michael [4 ]
Gruss, Daniel [1 ]
机构
[1] Graz Univ Technol, Graz, Austria
[2] Sapienza Univ Rome, Rome, Italy
[3] NVIDIA Res, Santa Clara, CA USA
[4] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
关键词
D O I
10.1109/SP46215.2023.10179297
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Compression algorithms have side channels due to their data-dependent operations. So far, only the compressionratio side channel was exploited, e.g., the compressed data size. In this paper, we present Decomp+Time, the first memorycompression attack exploiting a timing side channel in compression algorithms. While Decomp+Time affects a much broader set of applications than prior work. A key challenge is precisely crafting attacker-controlled compression payloads to enable the attack with sufficient resolution. Our evolutionary fuzzer, Comprezzor, finds effective Decomp+Time payloads that optimize latency differences such that decompression timing can even be exploited in remote attacks. Decomp+Time has a capacity of 9:73 kB=s locally, and 10:72 bit=min across the internet (14 hops). Using Comprezzor, we develop attacks that leak data bytewise in four different case studies: First, we leak 1:50 bit=min from Memcached on a remote PHP script. Second, we leak database records with 2:69 bit=min, from PostgreSQL in a Python-Flask application, over the internet. Third, we leak secrets with 49:14 bit=min locally from ZRAM-compressed pages on Linux. Fourth, we leak internal heap pointers from the V8 engine within the Google Chrome browser on a system using ZRAM. Thus, it is important to re-evaluate the use of compression on sensitive data even if the application is only reachable via a remote interface.
引用
收藏
页码:1186 / 1203
页数:18
相关论文
共 50 条
  • [21] Adversarial Black-Box Attacks with Timing Side-Channel Leakage
    Nakai, Tsunato
    Suzuki, Daisuke
    Omatsu, Fumio
    Fujino, Takeshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (01) : 143 - 151
  • [22] Preventing Timing Side-Channel Attacks in Software-Defined Networks
    Shoaib, Faizan
    Chow, Yang-Wai
    Vlahu-Gjorgievska, Elena
    2021 IEEE ASIA-PACIFIC CONFERENCE ON COMPUTER SCIENCE AND DATA ENGINEERING (CSDE), 2021,
  • [23] Practical Side-Channel and Fault Attacks on Lattice-Based Cryptography
    Ravi, Prasanna
    Chattopadhyay, Anupam
    Bhasin, Shivam
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 188 - 189
  • [24] Practical Analysis of RSA Countermeasures Against Side-Channel Electromagnetic Attacks
    Perin, Guilherme
    Imbert, Laurent
    Torres, Lionel
    Maurine, Philippe
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 2014, 8419 : 200 - 215
  • [25] Varys Protecting SGX Enclaves From Practical Side-Channel Attacks
    Oleksenko, Oleksii
    Trach, Bohdan
    Krahn, Robert
    Martin, Andre
    Fetzer, Christof
    Silberstein, Mark
    PROCEEDINGS OF THE 2018 USENIX ANNUAL TECHNICAL CONFERENCE, 2018, : 227 - 239
  • [26] Introduction to Side-Channel Attacks and Fault Attacks
    Li, Yang
    Chen, Mengting
    Wang, Jian
    2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575
  • [27] Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection
    Bogdanov, Andrey
    Kizhvatov, Ilya
    Pyshkin, Andrey
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 251 - +
  • [28] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [29] Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86
    Wang, Yingchen
    Paccagnella, Riccardo
    He, Elizabeth Tang
    Shacham, Hovav
    Fletcher, Christopher W.
    Kohlbrenner, David
    IEEE MICRO, 2023, 43 (04) : 19 - 27
  • [30] Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86
    Wang, Yingchen
    Paccagnella, Riccardo
    He, Elizabeth Tang
    Shacham, Hovav
    Fletcher, Christopher W.
    Kohlbrenner, David
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 679 - 697