Cross-VM cache attacks on Camellia

被引:0
|
作者
Milad Seddigh
Hadi Soleimany
机构
[1] Shahid Beheshti University,Cyberspace Research Institute
关键词
Camellia; Flush+Reload; Cache-based attack;
D O I
暂无
中图分类号
学科分类号
摘要
Flush+Reload is a powerful cache-based side-channel attack in which the attacker takes advantage of a security weakness in the X86 processor architecture to ascertain whether specific cache lines are accessed by the victim or not. The Flush+Reload attack can be performed in a cross-core setting under the assumption that the last level cache is shared between the cores. In this paper, we demonstrate that Camellia implementations of OpenSSL 1.1.0 running inside the victim VM are vulnerable to the Flush+Reload attacks. Camellia is an ISO/IEC standard and CRYPTREC-portfolio cipher which was jointly designed by NTT and Mitsubishi. Our experimental results demonstrate that the attacker is able to recover the secret keys of Camellia in less than 1 minute in the native setup by utilizing the Flush+Reload technique. Our work demonstrates that common implementations of this standard cipher are vulnerable against Flush+Reload attack in both native and cross-VM setups. To the best of our knowledge, the proposed attacks are the first attack on Camellia that can be applied in the cross-VM setting.
引用
收藏
页码:91 / 99
页数:8
相关论文
共 50 条
  • [11] Cross-VM Network Channel Attacks and Countermeasures Within Cloud Computing Environments
    Saeed, Atif
    Garraghan, Peter
    Hussain, Syed Asad
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1783 - 1794
  • [12] Shuffler: Mitigate Cross-VM Side-Channel Attacks via Hypervisor Scheduling
    Liu, Li
    Wang, An
    Zang, WanYu
    Yu, Meng
    Xiao, Menbai
    Chen, Songqing
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT I, 2018, 254 : 491 - 511
  • [13] CPU Elasticity to Mitigate Cross-VM Runtime Monitoring
    Mi, Zeyu
    Chen, Haibo
    Zhang, Yinqian
    Peng, Shuanghe
    Wang, Xiaofeng
    Reiter, Michael
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (05) : 1094 - 1108
  • [14] One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation
    Xiao, Yuan
    Zhang, Xiaokuan
    Zhang, Yinqian
    Teodorescu, Radu
    PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 19 - 35
  • [15] On Mitigating the Risk of Cross-VM Covert Channels in a Public Cloud
    Zhang, Rui
    Su, Xiaojun
    Wang, Jianping
    Wang, Cong
    Liu, Wenyin
    Lau, Rynson W. H.
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (08) : 2327 - 2339
  • [16] Trilochan: a solution to detect cross-VM direct timing attack
    Dhara H. Buch
    Haresh S. Bhatt
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 : 8745 - 8763
  • [17] Trilochan: a solution to detect cross-VM direct timing attack
    Buch, Dhara H.
    Bhatt, Haresh S.
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 14 (7) : 8745 - 8763
  • [18] A Generic Mitigation Framework against Cross-VM Covert Channels
    Qi, Wen
    Wang, Jin
    Hovhannisyan, Hemline
    Lu, Kejie
    Wang, Jianping
    Zhu, Junda
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [19] Trinetra: a solution to handle cross-VM time-driven attack
    Dhara H. Buch
    Haresh S. Bhatt
    SN Applied Sciences, 2020, 2
  • [20] Mitigating Cross-VM Side Channel Attack on Multiple Tenants Cloud Platform
    Liu, Fei
    Ren, Lanfang
    Bai, Hongtao
    JOURNAL OF COMPUTERS, 2014, 9 (04) : 1005 - 1013