Page Cache Attacks

被引:18
|
作者
Gruss, Daniel [1 ]
Kraft, Erik [1 ]
Tiwari, Trishita [2 ]
Schwarz, Michael [1 ]
Trachtenberg, Ari [2 ]
Hennessey, Jason [3 ]
Ionescu, Alex [4 ]
Fogh, Anders [5 ]
机构
[1] Graz Univ Technol, Graz, Austria
[2] Boston Univ, Boston, MA 02215 USA
[3] NetApp, Sunnyvale, CA USA
[4] CrowdStrike, Sunnyvale, CA USA
[5] Intel Corp, Santa Clara, CA 95051 USA
基金
美国国家科学基金会;
关键词
Software-based Attacks; Cache Attacks; Operating Systems;
D O I
10.1145/3319535.3339809
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a new side-channel attack that targets one of the most fundamental software caches in modern computer systems: the operating system page cache. The page cache is a pure software cache that contains all disk-backed pages, including program binaries, shared libraries, and other files. On Windows, dynamic pages are also part of this cache and can be attacked as well, e.g., data, heap, and stacks. Our side channel permits unprivileged monitoring of accesses to these pages of other processes, with a spatial resolution of 4 kB and a temporal resolution of 2 is on Linux (<= 6.7 measurements per second), and 466 ns on Windows 10 (<= 223 measurements per second). We systematically analyze the side channel by demonstrating different hardware-agnostic local attacks, including a sandbox-bypassing high-speed covert channel, an ASLR break on Windows 10, and various information leakages that can be used for targeted extortion, spam campaigns, and more directly for UI redressing attacks. We also show that, as with hardware cache attacks, we can attack the generation of temporary passwords on vulnerable cryptographic implementations. Our hardware-agnostic attacks can be mitigated with our proposed security patches, but the basic side channel remains exploitable via timing measurements. We demonstrate this with a remote covert channel exfiltrating information from a colluding process through innocuous server requests.
引用
收藏
页码:167 / 180
页数:14
相关论文
共 50 条
  • [31] Battling Bad Bits with Checksums in the Loris Page Cache
    van Moolenbroek, David C.
    Appuswamy, Raja
    Tanenbaum, Andrew S.
    2013 SIXTH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 2013, : 68 - 77
  • [32] Dynamic cache partitioning based on hot page migration
    Xiaolin Wang
    Xiang Wen
    Yechen Li
    Zhenlin Wang
    Yingwei Luo
    Xiaoming Li
    Frontiers of Computer Science, 2012, 6 : 363 - 372
  • [33] Hierarchical, adaptive cache consistency in a page server OODBMS
    Zaharioudakis, M
    Carey, MJ
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 1997, : 22 - 31
  • [34] A Page Cache Management Scheme in Cloud Computing Environments
    Chang, Hsung-Pin
    Liao, Chien-Neng
    Chang, Da-Wei
    IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 974 - 979
  • [35] NEWCACHE: SECURE CACHE ARCHITECTURE THWARTING CACHE SIDE-CHANNEL ATTACKS
    Liu, Fangfei
    Wu, Hao
    Mai, Kenneth
    Lee, Ruby B.
    IEEE MICRO, 2016, 36 (05) : 8 - 16
  • [36] Evaluation on the Impact of Cache Parameter Selection in Access-Driven Cache Attacks
    Guo, Pengfei
    Yan, Yingjian
    Ye, Bin
    Zhu, Chunsheng
    Zhang, Lichao
    Shen, Ting
    Chen, Lin
    ELECTRONICS, 2022, 11 (15)
  • [37] Cache Games - Bringing Access-Based Cache Attacks on AES to Practice
    Gullasch, David
    Bangerter, Endre
    Krenn, Stephan
    2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 490 - 505
  • [38] Cross-VM cache attacks on Camellia
    Milad Seddigh
    Hadi Soleimany
    Journal of Computer Virology and Hacking Techniques, 2022, 18 : 91 - 99
  • [39] Cache-Timing Attacks on AES and Remedies
    Baishnab, K. L.
    Nag, Amlan
    Talukdar, F. A.
    2009 INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ELECTRONIC AND PHOTONIC DEVICES AND SYSTEMS (ELECTRO-2009), 2009, : 218 - 221
  • [40] Cross-VM cache attacks on Camellia
    Seddigh, Milad
    Soleimany, Hadi
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2022, 18 (02) : 91 - 99