Page Cache Attacks

被引:18
|
作者
Gruss, Daniel [1 ]
Kraft, Erik [1 ]
Tiwari, Trishita [2 ]
Schwarz, Michael [1 ]
Trachtenberg, Ari [2 ]
Hennessey, Jason [3 ]
Ionescu, Alex [4 ]
Fogh, Anders [5 ]
机构
[1] Graz Univ Technol, Graz, Austria
[2] Boston Univ, Boston, MA 02215 USA
[3] NetApp, Sunnyvale, CA USA
[4] CrowdStrike, Sunnyvale, CA USA
[5] Intel Corp, Santa Clara, CA 95051 USA
基金
美国国家科学基金会;
关键词
Software-based Attacks; Cache Attacks; Operating Systems;
D O I
10.1145/3319535.3339809
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a new side-channel attack that targets one of the most fundamental software caches in modern computer systems: the operating system page cache. The page cache is a pure software cache that contains all disk-backed pages, including program binaries, shared libraries, and other files. On Windows, dynamic pages are also part of this cache and can be attacked as well, e.g., data, heap, and stacks. Our side channel permits unprivileged monitoring of accesses to these pages of other processes, with a spatial resolution of 4 kB and a temporal resolution of 2 is on Linux (<= 6.7 measurements per second), and 466 ns on Windows 10 (<= 223 measurements per second). We systematically analyze the side channel by demonstrating different hardware-agnostic local attacks, including a sandbox-bypassing high-speed covert channel, an ASLR break on Windows 10, and various information leakages that can be used for targeted extortion, spam campaigns, and more directly for UI redressing attacks. We also show that, as with hardware cache attacks, we can attack the generation of temporary passwords on vulnerable cryptographic implementations. Our hardware-agnostic attacks can be mitigated with our proposed security patches, but the basic side channel remains exploitable via timing measurements. We demonstrate this with a remote covert channel exfiltrating information from a colluding process through innocuous server requests.
引用
收藏
页码:167 / 180
页数:14
相关论文
共 50 条
  • [21] New Results on Instruction Cache Attacks
    Aciicmez, Onur
    Brumley, Billy Bob
    Grabher, Philipp
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 110 - 124
  • [22] Cache attacks on subkey calculation of Blowfish
    Fan, Haopeng
    Wang, Wenhao
    Wang, Yongjuan
    Wang, Xiangbin
    Gao, Yang
    JOURNAL OF COMPUTER SECURITY, 2024, 32 (02) : 165 - 191
  • [23] Cache Timing Attacks on Recent Microarchitectures
    Andreou, Alexandros
    Bogdanov, Andrey
    Tischhauser, Elmar
    2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 155 - 155
  • [24] Cache-Timing Template Attacks
    Brumley, Billy Bob
    Hakala, Risto M.
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 667 - 684
  • [25] Efficient Cache Attacks on AES, and Countermeasures
    Eran Tromer
    Dag Arne Osvik
    Adi Shamir
    Journal of Cryptology, 2010, 23 : 37 - 71
  • [26] Efficient Cache Attacks on AES, and Countermeasures
    Tromer, Eran
    Osvik, Dag Arne
    Shamir, Adi
    JOURNAL OF CRYPTOLOGY, 2010, 23 (01) : 37 - 71
  • [27] Internet cache pollution attacks and countermeasures
    Gao, Yan
    Deng, Leiwen
    Kuzmanovic, Aleksandar
    Chen, Yan
    PROCEEDINGS OF THE 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, 2006, : 53 - +
  • [28] Combined Cache Timing Attacks and Template Attacks on Stream Cipher MUGI
    Du, Shaoyu
    Li, Zhenqi
    Zhang, Bin
    Lin, Dongdai
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 235 - 249
  • [29] Dynamic cache partitioning based on hot page migration
    Wang, Xiaolin
    Wen, Xiang
    Li, Yechen
    Wang, Zhenlin
    Luo, Yingwei
    Li, Xiaoming
    FRONTIERS OF COMPUTER SCIENCE, 2012, 6 (04) : 363 - 372
  • [30] Hierarchical, adaptive cache consistency in a page server OODBMS
    Zaharioudakis, M
    Carey, MJ
    IEEE TRANSACTIONS ON COMPUTERS, 1998, 47 (04) : 427 - 444