Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information Leakage

被引:38
作者
Shin, Youngjoo [1 ]
Kim, Hyung Chan [2 ]
Kwon, Dokeun [2 ]
Jeong, Ji Hoon [2 ]
Hur, Junbeom [3 ]
机构
[1] Kwangwoon Univ, Seoul, South Korea
[2] ETRI, Affiliated Inst, Daejeon, South Korea
[3] Korea Univ, Seoul, South Korea
来源
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) | 2018年
基金
新加坡国家研究基金会;
关键词
Hardware prefetching; microarchitectural side-channel attacks; OpenSSL; ECDH algorithm; COUNTERMEASURES; ATTACKS;
D O I
10.1145/3243734.3243736
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data prefetching is a hardware-based optimization mechanism used in most of the modern microprocessors. It fetches data to the cache before it is needed. In this paper, we present a novel microarchitectural attack that exploits the prefetching mechanism. Our attack targets Instruction pointer (IP)-based stride prefetching in Intel processors. Stride prefetcher detects memory access patterns with a regular stride, which are likely to be found in lookup table-based cryptographic implementations. By monitoring the prefetching activities near the lookup table, attackers can extract sensitive information such as secret keys from victim applications. This kind of leakage from prefetching has never been considered in the design of constant time algorithm to prevent side-channel attacks. We show the potential of the proposed attack by applying it against the Elliptic Curve Diffie-Hellman (ECDH) algorithm built upon the latest version of OpenSSL library. To the best of our knowledge, this is the first microarchitectural side-channel attack exploiting the hardware prefetching of modern microprocessors.
引用
收藏
页码:131 / 145
页数:15
相关论文
共 58 条
[41]  
López J, 1999, LECT NOTES COMPUT SC, V1717, P316
[42]  
MacQueen J., 1967, BERK S MATH STAT PRO, V5, P281, DOI DOI 10.1007/S11665-016-2173-6
[43]  
Maisuradze G., 2018, ARXIV180104084
[44]   CacheZoom: How SGX Amplifies the Power of Cache Attacks [J].
Moghimi, Ahmad ;
Irazoqui, Gorka ;
Eisenbarth, Thomas .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 :69-90
[45]  
MONTGOMERY PL, 1987, MATH COMPUT, V48, P243, DOI 10.1090/S0025-5718-1987-0866113-7
[46]  
National Institute of Standards and Technology, 2013, 1864 FIPS PUB DSS NA
[47]  
Okeya K, 2000, LECT NOTES COMPUT SC, V1751, P238
[48]  
Osvik DA, 2006, LECT NOTES COMPUT SC, V3860, P1
[49]  
PALACHARLA S, 1994, CONF PROC INT SYMP C, P24
[50]  
Rane A, 2015, PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, P431