Practical Timing Side-Channel Attacks on Memory Compression

被引:1
|
作者
Schwarzl, Martin [1 ]
Borrello, Pietro [2 ]
Saileshwar, Gururaj [3 ]
Mueller, Hanna [1 ]
Schwarz, Michael [4 ]
Gruss, Daniel [1 ]
机构
[1] Graz Univ Technol, Graz, Austria
[2] Sapienza Univ Rome, Rome, Italy
[3] NVIDIA Res, Santa Clara, CA USA
[4] CISPA Helmholtz Ctr Informat Secur, Saarbrucken, Germany
关键词
D O I
10.1109/SP46215.2023.10179297
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Compression algorithms have side channels due to their data-dependent operations. So far, only the compressionratio side channel was exploited, e.g., the compressed data size. In this paper, we present Decomp+Time, the first memorycompression attack exploiting a timing side channel in compression algorithms. While Decomp+Time affects a much broader set of applications than prior work. A key challenge is precisely crafting attacker-controlled compression payloads to enable the attack with sufficient resolution. Our evolutionary fuzzer, Comprezzor, finds effective Decomp+Time payloads that optimize latency differences such that decompression timing can even be exploited in remote attacks. Decomp+Time has a capacity of 9:73 kB=s locally, and 10:72 bit=min across the internet (14 hops). Using Comprezzor, we develop attacks that leak data bytewise in four different case studies: First, we leak 1:50 bit=min from Memcached on a remote PHP script. Second, we leak database records with 2:69 bit=min, from PostgreSQL in a Python-Flask application, over the internet. Third, we leak secrets with 49:14 bit=min locally from ZRAM-compressed pages on Linux. Fourth, we leak internal heap pointers from the V8 engine within the Google Chrome browser on a system using ZRAM. Thus, it is important to re-evaluate the use of compression on sensitive data even if the application is only reachable via a remote interface.
引用
收藏
页码:1186 / 1203
页数:18
相关论文
共 50 条
  • [31] MEAS: memory encryption and authentication secure against side-channel attacks
    Unterluggauer, Thomas
    Werner, Mario
    Mangard, Stefan
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2019, 9 (02) : 137 - 158
  • [32] Gossip NoC - Avoiding Timing Side-Channel Attacks through Traffic Management
    Reinbrecht, Cezar
    Susin, Altamiro
    Bossuet, Lilian
    Sepulveda, Johanna
    2016 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2016, : 601 - 606
  • [33] DRM to Counter Side-Channel Attacks?
    Benadjila, Ryad
    Billet, Olivier
    Francfort, Stanislas
    DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT, 2007, : 23 - 32
  • [34] Codes for Side-Channel Attacks and Protections
    Guilley, Sylvain
    Heuser, Annelie
    Rioul, Olivier
    CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 35 - 55
  • [35] Side-Channel Attacks in a Real Scenario
    Ming Tang
    Maixing Luo
    Junfeng Zhou
    Zhen Yang
    Zhipeng Guo
    Fei Yan
    Liang Liu
    Tsinghua Science and Technology, 2018, 23 (05) : 586 - 598
  • [36] Synthesis of Adaptive Side-Channel Attacks
    Quoc-Sang Phan
    Bang, Lucas
    Pasareanu, Corina S.
    Malacaria, Pasquale
    Bultan, Tevfik
    2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 328 - 342
  • [37] MEAS: memory encryption and authentication secure against side-channel attacks
    Thomas Unterluggauer
    Mario Werner
    Stefan Mangard
    Journal of Cryptographic Engineering, 2019, 9 : 137 - 158
  • [38] Side-Channel Attacks in a Real Scenario
    Tang, Ming
    Luo, Maixing
    Zhou, Junfeng
    Yang, Zhen
    Guo, Zhipeng
    Yan, Fei
    Liu, Liang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 586 - 598
  • [39] AVX Timing Side-Channel Attacks against Address Space Layout Randomization
    Choi, Hyunwoo
    Kim, Suryeon
    Shin, Seungwon
    2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,
  • [40] KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
    Schwarz, Michael
    Lipp, Moritz
    Gruss, Daniel
    Weiser, Samuel
    Maurice, Clementine
    Spreitzer, Raphael
    Mangard, Stefan
    25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,