首页> 外文会议>Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust >Connecting the dots: Privacy leakage via write-access patterns to the main memory
【24h】

Connecting the dots: Privacy leakage via write-access patterns to the main memory

机译:连接点:通过写访问模式到主存储器的隐私泄漏

获取原文
获取原文并翻译 | 示例

摘要

Summary form only given. Data-dependent access patterns of an application to an untrusted storage system are notorious for leaking sensitive information about the user's data. Previous research has shown how an adversary capable of monitoring both read and write requests issued to the memory can correlate them with the application to learn its sensitive data. However, information leakage through only the write access patterns is less obvious and not well studied in the current literature. In this work, we demonstrate an actual attack on power-side-channel resistant Montgomery's ladder based modular exponentiation algorithm commonly used in public key cryptography. We infer the complete 512-bit secret exponent in ~ 3 5 minutes by virtue of just the write access patterns of the algorithm to the main memory. In order to learn the victim algorithm's write access patterns under realistic settings, we exploit a compromised DMA device to take frequent snapshots of the application's address space, and then run a simple differential analysis on these snapshots to find the write access sequence. The attack has been shown on an Intel Core(TM) i7-4790 3.60GHz processor based system. Although our exploitation strategy to infer the write access patterns has certain limitations, it conveys the underlying message that even if only the write access sequence is given, the application's sensitive information can be learned. We also discuss some techniques to overcome these limitations, and also some countermeasures to prevent such attacks.
机译:仅提供摘要表格。应用程序对不受信任的存储系统的依赖数据的访问模式因泄漏有关用户数据的敏感信息而臭名昭著。先前的研究表明,能够监视发出到内存的读取和写入请求的攻击者如何将它们与应用程序相关联,以了解其敏感数据。然而,仅通过写访问模式的信息泄漏不太明显,并且在当前文献中没有得到很好的研究。在这项工作中,我们演示了对公用密钥加密中常用的基于电源侧通道的蒙哥马利基于梯子的模块化幂运算算法的实际攻击。我们仅通过算法对主存储器的写访问模式就可以在大约3 5分钟内推断出完整的512位秘密指数。为了了解实际设置下的受害者算法的写访问模式,我们利用受损的DMA设备对应用程序地址空间进行频繁快照,然后对这些快照进行简单的差异分析以找到写访问序列。该攻击已在基于Intel Core™i7-4790 3.60GHz处理器的系统上显示。尽管我们的推断写访问模式的开发策略有一定的局限性,但它传达的基本信息是,即使仅给出写访问顺序,也可以了解应用程序的敏感信息。我们还将讨论一些克服这些限制的技术,以及一些防止此类攻击的对策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号