Videos

Published on May 28th, 2019 📆 | 2619 Views ⚑

0

Attack Directories, Not Caches: Side Channel Attacks in a Non Inclusive World


Text to Speech Demo



Attack Directories, Not Caches: Side Channel Attacks in a Non Inclusive World - Mengjia Yan
Presented at the
2019 IEEE Symposium on Security & Privacy
May 20–22, 2019
San Francisco, CA
http://www.ieee-security.org/TC/SP2019/

Although clouds have strong virtual memory isolation guarantees, cache attacks stemming from shared caches have proved to be a large security problem. However, despite the past effectiveness of cache attacks, their viability has recently been called into question on modern systems, due to trends in cache hierarchy design moving away from inclusive cache hierarchies.
In this paper, we reverse engineer the structure of the directory in a sliced, non-inclusive cache hierarchy, and prove that the directory can be used to bootstrap conflict-based cache attacks on the last-level cache. We design the first cross-core Prime+Probe attack on non-inclusive caches. This attack works with minimal assumptions: the adversary does not need to share any virtual memory with the victim, nor run on the same processor core. We also show the first high-bandwidth Evict+Reload attack on the same hardware. We demonstrate both attacks by extracting key bits during RSA operations in GnuPG on a state-of-the-art non-inclusive Intel Skylake-X server.

source





Tagged with:



Comments are closed.