Affiliation:
1. Cyberspace Research Institute, Shahid Beheshti University, Iran
Abstract
Abstract
Flush+Reload is a powerful access-driven cache attack in which the attacker leverages a security weakness in the X86 processor architecture to extract the private data of the victim. This attack can be mounted in a cross-core setting, where the memory deduplication is enabled and several users are sharing the same physical machine. In this paper, for the first time, we demonstrate that SEED implementation of OpenSSL 1.1.0 running inside the victim VM is vulnerable against the Flush+Reload attacks and the attacker can recover the keys of this encryption. SEED is a standard encryption algorithm that was developed by the Korea Information Security Agency (KISA) and has been used for confidential services in the Republic of Korea. Our work demonstrates that the attacker can retrieve the secret keys of SEED in 3 min in the native setup and 4 min in the cross-VM setup by performing the Flush+Reload technique. Our experimental results show that common implementation of this standard cipher is vulnerable to Flush+Reload attack in both native and cross-VM settings. To the best of our knowledge, this paper presents the first cache-based attack on a SEED block cipher.
Publisher
Oxford University Press (OUP)
Reference26 articles.
1. A survey of microarchitectural timing attacks and countermeasures on contemporary hardware;Ge;J. Cryptogr. Eng.,2018
2. Survey of access-driven cache-based side channel attack;Xinliang;Journal of Computer Research and Development,2020
3. Trinetra: a solution to handle cross-vm time-driven attack;Buch;SN Applied Sciences,2020
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Exploring Flush+Reload Side Channel Attack Vulnerabilities: Detection and Countermeasures;2023 2nd International Conference on Automation, Computing and Renewable Systems (ICACRS);2023-12-11