Cross-VM cache attacks on Camellia

被引:1
|
作者
Seddigh, Milad [1 ]
Soleimany, Hadi [1 ]
机构
[1] Shahid Beheshti Univ, Cyberspace Res Inst, Tehran, Iran
关键词
Camellia; Flush plus Reload; Cache-based attack;
D O I
10.1007/s11416-021-00393-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Flush+Reload is a powerful cache-based side-channel attack in which the attacker takes advantage of a security weakness in the X86 processor architecture to ascertain whether specific cache lines are accessed by the victim or not. The Flush+Reload attack can be performed in a cross-core setting under the assumption that the last level cache is shared between the cores. In this paper, we demonstrate that Camellia implementations of OpenSSL 1.1.0 running inside the victim VM are vulnerable to the Flush+Reload attacks. Camellia is an ISO/IEC standard and CRYPTREC-portfolio cipher which was jointly designed by NTT and Mitsubishi. Our experimental results demonstrate that the attacker is able to recover the secret keys of Camellia in less than 1 minute in the native setup by utilizing the Flush+Reload technique. Our work demonstrates that common implementations of this standard cipher are vulnerable against Flush+Reload attack in both native and cross-VM setups. To the best of our knowledge, the proposed attacks are the first attack on Camellia that can be applied in the cross-VM setting.
引用
收藏
页码:91 / 99
页数:9
相关论文
共 50 条
  • [1] Cross-VM cache attacks on Camellia
    Milad Seddigh
    Hadi Soleimany
    Journal of Computer Virology and Hacking Techniques, 2022, 18 : 91 - 99
  • [2] Cross-VM Cache Attacks on AES
    Gulmezoglu, Berk
    Inci, Mehmet Sinan
    Irazoqui, Gorka
    Eisenbarth, Thomas
    Sunar, Berk
    IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2016, 2 (03): : 211 - 222
  • [3] Cross-VM Cache Timing Attacks on Virtualized Network Functions
    Shin, Youngjoo
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2019, E102D (09): : 1874 - 1877
  • [4] Cross-VM cache-based side channel attacks and proposed prevention mechanisms: A survey
    Anwar, Shahid
    Inayat, Zakira
    Zolkipli, Mohamad Fadli
    Zain, Jasni Mohamad
    Gani, Abdullah
    Anuar, Nor Badrul
    Khan, Muhammad Khurram
    Chang, Victor
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 93 : 259 - 279
  • [5] Fine Grain Cross-VM Attacks on Xen and VMware
    Irazoqui, Gorka
    Inci, Mehmet Sinan
    Eisenbarth, Thomas
    Sunar, Berk
    2014 IEEE FOURTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING (BDCLOUD), 2014, : 737 - 744
  • [6] Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks
    Cimato, Stelvio
    Damiani, Ernesto
    Mella, Silvia
    Yang, Ching-Nung
    CLOUD COMPUTING AND SECURITY, ICCCS 2016, PT I, 2016, 10039 : 456 - 467
  • [7] Cross-VM Covert- and Side-Channel Attacks in Cloud FPGAs
    Giechaskiel, Ilias
    Tian, Shanquan
    Szefer, Jakub
    ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2023, 16 (01)
  • [8] An Effective and Scalable VM Migration Strategy to Mitigate Cross-VM Side-Channel Attacks in Cloud
    Chao Yang
    Yunfei Guo
    Hongchao Hu
    Wenyan Liu
    Yawen Wang
    中国通信, 2019, 16 (04) : 151 - 171
  • [9] A Shared Memory based Cross-VM Side Channel Attacks in IaaS Cloud
    Wang, Ziqi
    Yang, Rui
    Fu, Xiao
    Du, Xiaojiang
    Luo, Bin
    2016 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2016,
  • [10] An Effective and Scalable VM Migration Strategy to Mitigate Cross-VM Side-Channel Attacks in Cloud
    Yang, Chao
    Guo, Yunfei
    Hu, Hongchao
    Liu, Wenyan
    Wang, Yawen
    CHINA COMMUNICATIONS, 2019, 16 (04) : 151 - 171