Modern processors dynamically control their operating frequency to optimize resource utilization, maximize energy savings, and to conform to system-defined constraints. If, during the execution of a software workload, the running average of any electrical or thermal parameter exceeds its corresponding predefined threshold value, the power management architecture will reactively adjust CPU frequency to ensure safe operating conditions. In this paper, we demonstrate how such power management-based CPU throttling activity forms a source of timing side-channel information leakage, which can be exploited by an attacker to infer secret data from a constant-cycle victim workload. We highlight the fact that a constant-cycle implementation of code does not necessarily guarantee its constant execution on different data inputs with respect to wall clock time. This is because existing throttling mechanisms perform data-dependent frequency adjustments, which in turn make the running time of the code also data-dependent. The proposed frequency throttling side-channel analysis attack can be launched by kernel-space attackers and user-space attackers, thus compromising security guarantees provided by isolation boundaries. We validate our attack methodology across different systems by performing experiments on a constant-cycle implementation of the AES-128 algorithm. The results of our experimental evaluations demonstrate how the attacker can successfully recover the targeted AES key by correlating the collected timing side-channel traces with the corresponding timing estimates for different key guesses, under frequency throttling. Finally, we discuss different options to mitigate the threat posed by frequency throttling side-channel attacks, as well as their advantages and disadvantages.
翻译:现代处理器动态控制其操作频率,以优化资源利用,最大限度地节约能源,并遵守系统界定的限制。如果在执行软件工作量期间,任何电或热参数的运行平均值超过其相应的预定阈值,则电力管理架构将被动调整CPU频率,以确保安全运行条件。在本文中,我们展示了这种基于电源管理的CPU抽动活动如何形成一个计时侧通道信息泄漏的来源,攻击者可以利用这一渠道从周期性受害者工作量中推断出秘密数据。我们强调,代码的周期性执行并不一定保证其在墙钟时间方面对不同数据输入的不断执行优势。这是因为,现有的节流机制进行取决于数据的频率调整,而这反过来又使代码的运行时间也取决于数据。拟议频率抽动侧通道分析袭击可以通过内空攻击者和用户空间攻击者来启动,从而损害隔离边界提供的安全保障。我们验证了我们在不同系统中的攻击方法,通过在持续周期性轨道上对不同数据输入的频率数据投入进行实验,同时根据壁钟时间段时间段进行不同的周期性分析,从而通过对目标性AES128系统进行相应的修正分析,从而成功地评估我们如何评估。