Page Cache Attacks

被引:18
|
作者
Gruss, Daniel [1 ]
Kraft, Erik [1 ]
Tiwari, Trishita [2 ]
Schwarz, Michael [1 ]
Trachtenberg, Ari [2 ]
Hennessey, Jason [3 ]
Ionescu, Alex [4 ]
Fogh, Anders [5 ]
机构
[1] Graz Univ Technol, Graz, Austria
[2] Boston Univ, Boston, MA 02215 USA
[3] NetApp, Sunnyvale, CA USA
[4] CrowdStrike, Sunnyvale, CA USA
[5] Intel Corp, Santa Clara, CA 95051 USA
基金
美国国家科学基金会;
关键词
Software-based Attacks; Cache Attacks; Operating Systems;
D O I
10.1145/3319535.3339809
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a new side-channel attack that targets one of the most fundamental software caches in modern computer systems: the operating system page cache. The page cache is a pure software cache that contains all disk-backed pages, including program binaries, shared libraries, and other files. On Windows, dynamic pages are also part of this cache and can be attacked as well, e.g., data, heap, and stacks. Our side channel permits unprivileged monitoring of accesses to these pages of other processes, with a spatial resolution of 4 kB and a temporal resolution of 2 is on Linux (<= 6.7 measurements per second), and 466 ns on Windows 10 (<= 223 measurements per second). We systematically analyze the side channel by demonstrating different hardware-agnostic local attacks, including a sandbox-bypassing high-speed covert channel, an ASLR break on Windows 10, and various information leakages that can be used for targeted extortion, spam campaigns, and more directly for UI redressing attacks. We also show that, as with hardware cache attacks, we can attack the generation of temporary passwords on vulnerable cryptographic implementations. Our hardware-agnostic attacks can be mitigated with our proposed security patches, but the basic side channel remains exploitable via timing measurements. We demonstrate this with a remote covert channel exfiltrating information from a colluding process through innocuous server requests.
引用
收藏
页码:167 / 180
页数:14
相关论文
共 50 条
  • [41] ASLR on the Line: Practical Cache Attacks on the MMU
    Gras, Ben
    Razavi, Kaveh
    Bosman, Erik
    Bos, Herbert
    Giuffrida, Cristiano
    24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,
  • [42] A Mitigation System for ARP Cache Poisoning Attacks
    Prabadevi, B.
    Jeyanthi, N.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [43] Cache Side-Channel Attacks and Defenses
    Zhang W.
    Bai L.
    Ling Y.
    Lan X.
    Jia X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [44] Cross-VM Cache Attacks on AES
    Gulmezoglu, Berk
    Inci, Mehmet Sinan
    Irazoqui, Gorka
    Eisenbarth, Thomas
    Sunar, Berk
    IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2016, 2 (03): : 211 - 222
  • [45] A Revisit of DNS Kaminsky Cache Poisoning Attacks
    Wang, Zheng
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [46] Improving cache attacks by considering cipher structure
    Tsunoo Y.
    Tsujihara E.
    Shigeri M.
    Kubo H.
    Minematsu K.
    International Journal of Information Security, 2006, 5 (3) : 166 - 176
  • [47] NetCAT: Practical Cache Attacks from the Network
    Kurth, Michael
    Gras, Ben
    Andriesse, Dennis
    Giuffrida, Cristiano
    Bos, Herbert
    Razavi, Kaveh
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 20 - 38
  • [48] Cache based power analysis attacks on AES
    Fournier, Jacques
    Tunstall, Michael
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 17 - 28
  • [49] Poster: On the Capability of DNS Cache Poisoning Attacks
    Wang, Zheng
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1523 - 1525
  • [50] Explicit Non-reusable Page Cache Management to Minimize Last Level Cache Pollution
    Kim, Jongwon
    Jeong, Jinkyu
    Kim, Hwanju
    Lee, Joonwon
    2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 567 - 570