Visible to the public DABANGG: A Case for Noise Resilient Flush-Based Cache Attacks

TitleDABANGG: A Case for Noise Resilient Flush-Based Cache Attacks
Publication TypeConference Paper
Year of Publication2022
AuthorsSaxena, Anish, Panda, Biswabandan
Conference Name2022 IEEE Security and Privacy Workshops (SPW)
Date Publishedmay
Keywordscalibration, compositionality, Dynamic Voltage & Frequency Scaling, human factors, iOS Security, Metrics, Multicore processing, privacy, pubcrawl, rendering (computer graphics), resilience, Resiliency, Runtime, security, side-channel attacks, Side-Channel Detectors, Voltage
AbstractFlush-based cache attacks like Flush+Reload and Flush+Flush are highly precise and effective. Most of the flush-based attacks provide high accuracy in controlled and isolated environments where attacker and victim share OS pages. However, we observe that these attacks are prone to low accuracy on a noisy multi-core system with co-running applications. Two root causes for the varying accuracy of flush-based attacks are: (i) the dynamic nature of core frequencies that fluctuate depending on the system load, and (ii) the relative placement of victim and attacker threads in the processor, like same or different physical cores. These dynamic factors critically affect the execution latency of key instructions like clflush and mov, rendering the pre-attack calibration step ineffective.We propose DABANGG, a set of novel refinements to make flush-based attacks resilient to system noise by making them aware of frequency and thread placement. First, we introduce pre-attack calibration that is aware of instruction latency variation. Second, we use low-cost attack-time optimizations like fine-grained busy waiting and periodic feedback about the latency thresholds to improve the effectiveness of the attack. Finally, we provide victim-specific parameters that significantly improve the attack accuracy. We evaluate DABANGG-enabled Flush+Reload and Flush+Flush attacks against the standard attacks in side-channel and covert-channel experiments with varying levels of compute, memory, and IO-intensive system noise. In all scenarios, DABANGG+Flush+Reload and DABANGG+Flush+Flush outperform the standard attacks in stealth and accuracy.
NotesISSN: 2770-8411
DOI10.1109/SPW54247.2022.9833897
Citation Keysaxena_dabangg_2022