Cache Games - Bringing Access-Based Cache Attacks on AES to Practice

被引:312
作者
Gullasch, David [1 ]
Bangerter, Endre [1 ]
Krenn, Stephan [1 ]
机构
[1] Bern Univ Appl Sci, Bern, Switzerland
来源
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011) | 2011年
关键词
AES; side channel; access-based cache attacks;
D O I
10.1109/SP.2011.22
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Side channel attacks on cryptographic systems exploit information gained from physical implementations rather than theoretical weaknesses of a scheme. In recent years, major achievements were made for the class of so called access-driven cache attacks. Such attacks exploit the leakage of the memory locations accessed by a victim process. In this paper we consider the AES block cipher and present an attack which is capable of recovering the full secret key in almost realtime for AES-128, requiring only a very limited number of observed encryptions. Unlike previous attacks, we do not require any information about the plaintext (such as its distribution, etc.). Moreover, for the first time, we also show how the plaintext can be recovered without having access to the ciphertext at all. It is the first working attack on AES implementations using compressed tables. There, no efficient techniques to identify the beginning of AES rounds is known, which is the fundamental assumption underlying previous attacks. We have a fully working implementation of our attack which is able to recover AES keys after observing as little as 100 encryptions. It works against the OpenSSL 0.9.8n implementation of AES on Linux systems. Our spy process does not require any special privileges beyond those of a standard Linux user. A contribution of probably independent interest is a denial of service attack on the task scheduler of current Linux systems (CFS), which allows one to observe (on average) every single memory access of a victim process.
引用
收藏
页码:490 / 505
页数:16
相关论文
共 42 条
[1]  
Aciicmez O., 2006, 2006138 CRYPT
[2]  
Aciiçmez O, 2007, LECT NOTES COMPUT SC, V4377, P271
[3]  
Aciiçmez O, 2010, LECT NOTES COMPUT SC, V6225, P110, DOI 10.1007/978-3-642-15031-9_8
[4]  
[Anonymous], 2010, INT 64 IA 32 ARCH A
[5]  
[Anonymous], 2001, 197 FIPS NAT I STAND
[6]  
[Anonymous], 2002, THEORETICAL USE CACH
[7]  
[Anonymous], Philosophical Transactions of the Royal Society of London for, DOI DOI 10.1098/RSTL.1763.0053
[8]  
[Anonymous], 2005, NEURAL NETWORKS PATT
[9]  
[Anonymous], 2010, INT 64 IA 32 ARCH OP
[10]  
[Anonymous], 1996, CRYPTO, DOI DOI 10.1007/3-540-68697-5_9