The arm race between hardware security engineers and side-channel researchers has become more competitive with more sophisticated attacks and defenses in the last decade. While modern hardware features improve the system performance significantly, they may create new attack surfaces for malicious people to extract sensitive information about users without physical access to the victim device. Although many previously exploited hardware and OS features were patched by OS developers and chip vendors, any feature that is accessible from userspace applications can be exploited to perform software-based side-channel attacks. In this paper, we present DF-SCA, which is a software-based dynamic frequency side-channel attack on Linux and Android OS devices. We exploit unprivileged access to cpufreq interface that exposes real-time CPU core frequency values directly correlated with the system utilization, creating a reliable side-channel for attackers. We show that Dynamic Voltage and Frequency Scaling (DVFS) feature in modern systems can be utilized to perform website fingerprinting attacks for Google Chrome and Tor browsers on modern Intel, AMD, and ARM architectures. We further extend our analysis to a wide selection of scaling governors on Intel and AMD CPUs, verifying that all scaling governors provide enough information on the visited web page. Moreover, we extract properties of keystroke patterns on frequency readings, that leads to 95% accuracy to distinguish the keystrokes from other activities on Android phones. We leverage inter-keystroke timings of a user by training a k-th nearest neighbor model, which achieves 88% password recovery rate in the first guess on Bank of America application. Finally, we propose several countermeasures to mask the user activity to mitigate DF-SCA on Linux-based systems.
翻译:硬安全硬件工程师和侧通道研究人员之间的手臂竞赛在过去十年中随着更精密的攻击和防御而变得更具竞争力。虽然现代硬件功能在过去十年中大大提高了系统性能,但可能会为恶意分子创造新的攻击面面面,以获取有关用户的敏感信息。虽然许多先前开发的硬件和OS功能被OS开发商和芯片供应商修补,但从用户空间应用程序中可以进入的任何功能都可以用来进行基于软件的侧通道攻击。在本文中,我们提出了DF-SCA,这是对Linux和Andro的OS设备的基于软件的更尖端攻击和防御。虽然现代硬件特征显著提高了系统性能的功能。虽然现代硬件工程师和芯片供应商和供应商供应商之间的竞动竞斗,但任何从用户空间应用中可以用来对基于软件的Google Chrome和Tor-在现代英特尔、AMDL 和ARM 的T浏览点浏览器进行基于软件定位系统定位攻击。我们进一步扩展了对基于软件的用户访问模式应用模式,在互联网利用率方面,在互联网上,在互联网上,在互联网上,在互联网上,在互联网上,在互联网上,在互联网上,在互联网上,在提供(我们提供(我们访问的、AMDMDDDDD)和(我们提供(我们提供的、AMA、DDDFDFDFDF)的,在(我们(我们(我们)的)和(我们(我们)的)的,在(我们(我们(我们(我们(我们)的)的)和(我们(我们(我们的)的)的)和(我们(我们(我们的)的)的)的)和(我们(我们(我们(我们)的)的)的)的)的)的(我们(我们(我们(S)的)的)的)的)的(我们(S)的)的)的(我们(我们(S)的)的)的)的)的(我们(我们(我们(S)的)的(我们(S)的)的(提供的)的)的)的)的)的)的)的)的(S)的(我们(S)的(S)的(S)的(S)的(C)的)的)的(