Cross-VM cache attacks on Camellia

被引:1
|
作者
Seddigh, Milad [1 ]
Soleimany, Hadi [1 ]
机构
[1] Shahid Beheshti Univ, Cyberspace Res Inst, Tehran, Iran
关键词
Camellia; Flush plus Reload; Cache-based attack;
D O I
10.1007/s11416-021-00393-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Flush+Reload is a powerful cache-based side-channel attack in which the attacker takes advantage of a security weakness in the X86 processor architecture to ascertain whether specific cache lines are accessed by the victim or not. The Flush+Reload attack can be performed in a cross-core setting under the assumption that the last level cache is shared between the cores. In this paper, we demonstrate that Camellia implementations of OpenSSL 1.1.0 running inside the victim VM are vulnerable to the Flush+Reload attacks. Camellia is an ISO/IEC standard and CRYPTREC-portfolio cipher which was jointly designed by NTT and Mitsubishi. Our experimental results demonstrate that the attacker is able to recover the secret keys of Camellia in less than 1 minute in the native setup by utilizing the Flush+Reload technique. Our work demonstrates that common implementations of this standard cipher are vulnerable against Flush+Reload attack in both native and cross-VM setups. To the best of our knowledge, the proposed attacks are the first attack on Camellia that can be applied in the cross-VM setting.
引用
收藏
页码:91 / 99
页数:9
相关论文
共 50 条
  • [41] VM-aware Adaptive Storage Cache Prefetching
    Matsuzawa, Keiichi
    Shinagawa, Takahiro
    2017 9TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2017, : 65 - 73
  • [42] SCATTERCACHE: Thwarting Cache Attacks via Cache Set Randomization
    Werner, Mario
    Unterluggauer, Thomas
    Giner, Lukas
    Schwarz, Michael
    Gruss, Daniel
    Mangard, Stefan
    PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 675 - 692
  • [43] Camellia访问驱动Cache计时攻击研究
    赵新杰
    王韬
    郑媛媛
    计算机学报, 2010, 33 (07) : 1153 - 1164
  • [44] Reducing DNS Cache Poisoning Attacks
    Mohan, Jayashree
    Puranik, Shruthi
    Chandrasekaran, K.
    ICACCS 2015 PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS, 2015,
  • [45] ARMageddon: Cache Attacks on Mobile Devices
    Lipp, Moritz
    Gruss, Daniel
    Spreitzer, Raphael
    Maurice, Clementine
    Mangard, Stefan
    PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 549 - 564
  • [46] Cache attacks and countermeasures: The case of AES
    Osvik, DA
    Shamir, A
    Tromer, E
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 1 - 20
  • [47] Pinpointing Cache Timing Attacks on AES
    Rebeiro, Chester
    Mondal, Mainack
    Mukhopadhyay, Debdeep
    23RD INTERNATIONAL CONFERENCE ON VLSI DESIGN, 2010, : 306 - 311
  • [48] New Results on Instruction Cache Attacks
    Aciicmez, Onur
    Brumley, Billy Bob
    Grabher, Philipp
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 110 - 124
  • [49] Cache attacks on subkey calculation of Blowfish
    Fan, Haopeng
    Wang, Wenhao
    Wang, Yongjuan
    Wang, Xiangbin
    Gao, Yang
    JOURNAL OF COMPUTER SECURITY, 2024, 32 (02) : 165 - 191
  • [50] Cache Timing Attacks on Recent Microarchitectures
    Andreou, Alexandros
    Bogdanov, Andrey
    Tischhauser, Elmar
    2017 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2017, : 155 - 155