Side-Channel Attacks on Shared Search Indexes

被引:2
|
作者
Wang, Liang [1 ]
Grubbs, Paul [2 ]
Lu, Jiahui [3 ]
Bindschaedler, Vincent [4 ]
Cash, David [5 ]
Ristenpart, Thomas [2 ]
机构
[1] UW Madison, Madison, WI 53706 USA
[2] Cornell Tech, New York, NY USA
[3] SJTU, Shanghai, Peoples R China
[4] UIUC, Champaign, IL USA
[5] Rutgers State Univ, New Brunswick, NJ USA
关键词
side channels; SaaS security; elasticsearch;
D O I
10.1109/SP.2017.50
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Full-text search systems, such as Elasticsearch and Apache Solr, enable document retrieval based on keyword queries. In many deployments these systems are multi-tenant, meaning distinct users' documents reside in, and their queries are answered by, one or more shared search indexes. Large deployments may use hundreds of indexes across which user documents are randomly assigned. The results of a search query are filtered to remove documents to which a client should not have access. We show the existence of exploitable side channels in modern multi-tenant search. The starting point for our attacks is a decade-old observation that the TF-IDF scores used to rank search results can potentially leak information about other users' documents. To the best of our knowledge, no attacks have been shown that exploit this side channel in practice, and constructing a working side channel requires overcoming numerous challenges in real deployments. We nevertheless develop a new attack, called STRESS (Search Text RElevance Score Side channel), and in so doing show how an attacker can map out the number of indexes used by a service, obtain placement of a document within each index, and then exploit co-tenancy with all other users to (1) discover the terms in other tenants' documents or (2) determine the number of documents (belonging to other tenants) that contain a term of interest. In controlled experiments, we demonstrate the attacks on popular services such as GitHub and Xen. do. We conclude with a discussion of countermeasures.
引用
收藏
页码:673 / 692
页数:20
相关论文
共 50 条
  • [31] SonarSnoop: active acoustic side-channel attacks
    Cheng, Peng
    Bagci, Ibrahim Ethem
    Roedig, Utz
    Yan, Jeff
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (02) : 213 - 228
  • [32] Improved side-channel collision attacks on AES
    Bogdanov, Andrey
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 84 - 95
  • [33] Wireless Charging Power Side-Channel Attacks
    La Cour, Alexander S.
    Afridi, Khurram K.
    Suh, G. Edward
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 651 - 665
  • [34] Better Side-Channel Attacks Through Measurements
    Singh, Alok K.
    Gerdes, Ryan M.
    PROCEEDINGS OF THE 2023 WORKSHOP ON ATTACKS AND SOLUTIONS IN HARDWARE SECURITY, ASHES 2023, 2023, : 15 - 26
  • [35] Enhanced Side-Channel Cube Attacks on PRESENT
    Zhao, Xinjie
    Guo, Shize
    Zhang, Fan
    Wang, Tao
    Shi, Zhijie
    Luo, Hao
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 332 - 339
  • [36] Side-Channel Attacks on Fingerprint Matching Algorithms
    Duermuth, Markus
    Oswald, David
    Pastewka, Niklas
    TRUSTED'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON TRUSTWORTHY EMBEDDED DEVICES, 2016, : 3 - 13
  • [37] On the Challenges of Detecting Side-Channel Attacks in SGX
    Jiang, Jianyu
    Soriente, Claudio
    Karame, Ghassan
    PROCEEDINGS OF 25TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2022, 2022, : 86 - 98
  • [38] Beyond the CPU: Side-Channel Attacks on GPUs
    Naghibijouybari, Hoda
    Neupane, Ajaya
    Qian, Zhiyun
    Abu-Ghazaleh, Nael
    IEEE DESIGN & TEST, 2021, 38 (03) : 15 - 21
  • [39] SonarSnoop: active acoustic side-channel attacks
    Peng Cheng
    Ibrahim Ethem Bagci
    Utz Roedig
    Jeff Yan
    International Journal of Information Security, 2020, 19 : 213 - 228
  • [40] Cache Side-Channel Attacks in Cloud Computing
    Younis, Younis
    Kifayat, Kashif
    Merabti, Madjid
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2014), 2014, : 138 - 146