Cache side-channel attacks lead to severe security threats to the settings that a CPU is shared across users, e.g., in the cloud. The existing attacks rely on sensing the micro-architectural state changes made by victims, and this assumption can be invalidated by combining spatial (\eg, Intel CAT) and temporal isolation (\eg, time protection). In this work, we advance the state of cache side-channel attacks by showing stateless cache side-channel attacks that cannot be defeated by both spatial and temporal isolation. This side-channel exploits the timing difference resulted from interconnect congestion. Specifically, to complete cache transactions, for Intel CPUs, cache lines would travel across cores via the CPU mesh interconnect. Nonetheless, the mesh links are shared by all cores, and cache isolation does not segregate the traffic. An attacker can generate interconnect traffic to contend with the victim's on a mesh link, hoping that extra delay will be measured. With the variant delays, the attacker can deduce the memory access pattern of a victim program, and infer its sensitive data. Based on this idea, we implement Volcano and test it against the existing RSA implementations of JDK. We found the RSA private key used by a victim process can be partially recovered. In the end, we propose a few directions for defense and call for the attention of the security community.
翻译:缓冲侧道袭击导致对以下环境的严重安全威胁:CPU在用户之间共享,例如在云中。现有的袭击依赖于对受害者作出的微结构构造状态变化的感知,而这一假设可以通过将空间(eg, IntelCAT)和时间隔离(ge,时间保护)相结合而无效。在这项工作中,我们通过显示无国籍缓冲侧道袭击状态,显示无国籍缓冲侧道袭击无法被空间和时间隔离击败。这一侧道利用了互联性拥堵造成的时间差异。具体来说,对于 Intel CPU来说,缓冲线将通过 CPU 网际连接跨越核心。尽管如此,所有核心都共享网状连接,缓冲隔离并不隔离交通。攻击者可以产生连接流量,与受害人在网状连接上进行争斗,希望能够测量更多的延迟。随着变式的拖延,攻击者可以推断出受害人程序的记忆访问模式,并推断出其敏感数据通过 CUMD 。我们根据目前的安全模式测试了目前的安全方向。