DocumentCode :
2351181
Title :
Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice
Author :
Gullasch, David ; Bangerter, Endre ; Krenn, Stephan
fYear :
2011
fDate :
22-25 May 2011
Firstpage :
490
Lastpage :
505
Abstract :
Side channel attacks on cryptographic systems exploit information gained from physical implementations rather than theoretical weaknesses of a scheme. In recent years, major achievements were made for the class of so called access-driven cache attacks. Such attacks exploit the leakage of the memory locations accessed by a victim process. In this paper we consider the AES block cipher and present an attack which is capable of recovering the full secret key in almost real time for AES-128, requiring only a very limited number of observed encryptions. Unlike previous attacks, we do not require any information about the plaintext (such as its distribution, etc.). Moreover, for the first time, we also show how the plaintext can be recovered without having access to the cipher text at all. It is the first working attack on AES implementations using compressed tables. There, no efficient techniques to identify the beginning of AES rounds is known, which is the fundamental assumption underlying previous attacks. We have a fully working implementation of our attack which is able to recover AES keys after observing as little as 100 encryptions. It works against the OpenS SL 0.9.8n implementation of AES on Linux systems. Our spy process does not require any special privileges beyond those of a standard Linux user. A contribution of probably independent interest is a denial of service attack on the task scheduler of current Linux systems (CFS), which allows one to observe (on average) every single memory access of a victim process.
Keywords :
Linux; cache storage; cryptography; AES block cipher; AES-128; CFS; OpenS SL 0.9.8n; access-based cache attacks; advanced encryption standard; cache games; cryptographic systems; current Linux systems; denial of service attack; memory location leakage; side channel attacks; task scheduler; Cryptography; Linux; Matrices; Memory management; Monitoring; Random access memory; AES; access-based cache attacks; side channel;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy (SP), 2011 IEEE Symposium on
Conference_Location :
Berkeley, CA
ISSN :
1081-6011
Print_ISBN :
978-1-4577-0147-4
Electronic_ISBN :
1081-6011
Type :
conf
DOI :
10.1109/SP.2011.22
Filename :
5958048
Link To Document :
بازگشت