连接点:通过写访问模式到主存储器的隐私泄漏

T. M. John, Syed Kamran Haider, H. Omar, Marten van Dijk
{"title":"连接点:通过写访问模式到主存储器的隐私泄漏","authors":"T. M. John, Syed Kamran Haider, H. Omar, Marten van Dijk","doi":"10.1109/HST.2017.7951834","DOIUrl":null,"url":null,"abstract":"Data-dependent access patterns of an application to an untrusted storage system are notorious for leaking sensitive information about the user's data. Previous research has shown how an adversary capable of monitoring both read and write requests issued to the memory can correlate them with the application to learn its sensitive data. However, information leakage through only the write access patterns is less obvious and not well studied in the current literature. In this work, we demonstrate an actual attack on power-side-channel resistant Montgomery's ladder based modular exponentiation algorithm commonly used in public key cryptography. We infer the complete 512-bit secret exponent in ∼ 3 5 minutes by virtue of just the write access patterns of the algorithm to the main memory. In order to learn the victim algorithm's write access patterns under realistic settings, we exploit a compromised DMA device to take frequent snapshots of the application's address space, and then run a simple differential analysis on these snapshots to find the write access sequence. The attack has been shown on an Intel Core(TM) i7-4790 3.60GHz processor based system. Although our exploitation strategy to infer the write access patterns has certain limitations, it conveys the underlying message that even if only the write access sequence is given, the application's sensitive information can be learned. We also discuss some techniques to overcome these limitations, and also some countermeasures to prevent such attacks.","PeriodicalId":190635,"journal":{"name":"2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":"{\"title\":\"Connecting the dots: Privacy leakage via write-access patterns to the main memory\",\"authors\":\"T. M. John, Syed Kamran Haider, H. Omar, Marten van Dijk\",\"doi\":\"10.1109/HST.2017.7951834\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data-dependent access patterns of an application to an untrusted storage system are notorious for leaking sensitive information about the user's data. Previous research has shown how an adversary capable of monitoring both read and write requests issued to the memory can correlate them with the application to learn its sensitive data. However, information leakage through only the write access patterns is less obvious and not well studied in the current literature. In this work, we demonstrate an actual attack on power-side-channel resistant Montgomery's ladder based modular exponentiation algorithm commonly used in public key cryptography. We infer the complete 512-bit secret exponent in ∼ 3 5 minutes by virtue of just the write access patterns of the algorithm to the main memory. In order to learn the victim algorithm's write access patterns under realistic settings, we exploit a compromised DMA device to take frequent snapshots of the application's address space, and then run a simple differential analysis on these snapshots to find the write access sequence. The attack has been shown on an Intel Core(TM) i7-4790 3.60GHz processor based system. Although our exploitation strategy to infer the write access patterns has certain limitations, it conveys the underlying message that even if only the write access sequence is given, the application's sensitive information can be learned. We also discuss some techniques to overcome these limitations, and also some countermeasures to prevent such attacks.\",\"PeriodicalId\":190635,\"journal\":{\"name\":\"2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)\",\"volume\":\"45 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"20\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/HST.2017.7951834\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HST.2017.7951834","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 20

摘要

应用程序对不受信任的存储系统的数据依赖访问模式因泄露有关用户数据的敏感信息而臭名昭著。先前的研究表明,攻击者能够监控发出到内存的读和写请求,并将它们与应用程序联系起来,以了解其敏感数据。然而,仅通过写访问模式进行的信息泄漏不太明显,目前的文献研究也不够充分。在这项工作中,我们演示了一种针对公钥密码学中常用的功率侧信道抵抗蒙哥马利阶梯模幂算法的实际攻击。我们仅凭借算法对主存储器的写访问模式,在~ 35分钟内推断出完整的512位秘密指数。为了了解受害者算法在实际设置下的写访问模式,我们利用受损的DMA设备对应用程序的地址空间进行频繁快照,然后对这些快照进行简单的差异分析以找到写访问顺序。该攻击已在基于英特尔酷睿(TM) i7-4790 3.60GHz处理器的系统上显示。尽管我们推断写访问模式的利用策略有一定的局限性,但它传达了一个基本信息,即即使只给出了写访问顺序,也可以了解应用程序的敏感信息。我们还讨论了克服这些限制的一些技术,以及防止此类攻击的一些对策。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Connecting the dots: Privacy leakage via write-access patterns to the main memory
Data-dependent access patterns of an application to an untrusted storage system are notorious for leaking sensitive information about the user's data. Previous research has shown how an adversary capable of monitoring both read and write requests issued to the memory can correlate them with the application to learn its sensitive data. However, information leakage through only the write access patterns is less obvious and not well studied in the current literature. In this work, we demonstrate an actual attack on power-side-channel resistant Montgomery's ladder based modular exponentiation algorithm commonly used in public key cryptography. We infer the complete 512-bit secret exponent in ∼ 3 5 minutes by virtue of just the write access patterns of the algorithm to the main memory. In order to learn the victim algorithm's write access patterns under realistic settings, we exploit a compromised DMA device to take frequent snapshots of the application's address space, and then run a simple differential analysis on these snapshots to find the write access sequence. The attack has been shown on an Intel Core(TM) i7-4790 3.60GHz processor based system. Although our exploitation strategy to infer the write access patterns has certain limitations, it conveys the underlying message that even if only the write access sequence is given, the application's sensitive information can be learned. We also discuss some techniques to overcome these limitations, and also some countermeasures to prevent such attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信