Skip to main content

CacheRascal: Defending the Flush-Reload Side-Channel Attack in PaaS Clouds

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10251))

Abstract

The phenomenon that different instances in the cloud reside on the same physical machine is defined as co-residence. Co-residence introduces the risk of side-channel attacks, which utilize the shared resources to gain useful information. Flush-Reload attack is one of the cache-based side-channel attacks that are usually used to extract the victim process’s sensitive information such as private keys. We propose a defense scheme called CacheRascal to mitigate the Flush-Reload attack in the PaaS clouds. CacheRascal can automatically detect the execution of security-critical modules and initiate protection through cache confusion within 1 ms. It does not need to make any changes to the existing PaaS clouds and is easy to deploy. The experiment results show that our defense scheme effectively obfuscates the cache and incurs performance overhead of less than 2%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Here “instance” refers to a service unit provided to the tenants by the cloud providers, e.g., a container or a virtual machine.

References

  1. Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 199–212. ACM (2009)

    Google Scholar 

  2. Varadarajan, V., Zhang, Y., Ristenpart, T., Swift, M.: A placement vulnerability study in multi-tenant public clouds. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 913–928 (2015)

    Google Scholar 

  3. Zhang, W., Jia, X., Wang, C., Zhang, S., Huang, Q., Wang, M., Liu, P.: A comprehensive study of co-residence threat in multi-tenant public PaaS clouds. In: Lam, K.-Y., Chi, C.-H., Qing, S. (eds.) ICICS 2016. LNCS, vol. 9977, pp. 361–375. Springer, Cham (2016). doi:10.1007/978-3-319-50011-9_28

    Chapter  Google Scholar 

  4. Zhang, Y., Juels, A., Reiter, M.K., Ristenpart, T.: Cross-tenant side-channel attacks in PaaS clouds. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 990–1003 (2014)

    Google Scholar 

  5. Bangerter, E.: Cache gamesc bringing access-based cache attacks on AES to practice. In: Workshop COSADE, vol. 2010, no. 1, pp. 490–505 (2011)

    Google Scholar 

  6. Side-channel attacks on everyday applications: Distinguishing inputs with flush+reload. http://www.blackhat.com/docs/us-16/materials/us-16-Hornby-Side-Channel-Attacks-On-Everyday-Applications-wp.pdf (2016). Accessed 1 Jan 2017

  7. Yarom, Y., Falkner, K.: Flush+ reload: a high resolution, low noise, L3 cache side-channel attack. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 719–732 (2014)

    Google Scholar 

  8. Docker. https://www.docker.io/. Accessed 23 Apr 2016

  9. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  10. Gordon, D.M.: A survey of fast exponentiation methods. J. Algorithms 27(1), 129–146 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  11. Chang, C.-C., Lin, C.-J.: LIBSVM: a library for support vector machines. ACM Trans. Intell. Syst. Technol. (TIST) 2(3), 27 (2011)

    Google Scholar 

  12. Zhang, Y., Juels, A., Reiter, M.K., Ristenpart, T.: Cross-VM side channels and their use to extract private keys. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 305–316. ACM (2012)

    Google Scholar 

  13. CORPORATION, I.: Intel 64 and ia-32 architecture optimization reference manual (2012)

    Google Scholar 

  14. Zhang, Y., Reiter, M.K.: Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 827–838. ACM (2013)

    Google Scholar 

  15. Gullasch, D., Bangerter, E., Krenn, S.: Cache games-bringing access-based cache attacks on AES to practice. In: 2011 IEEE Symposium on Security and Privacy, pp. 490–505. IEEE (2011)

    Google Scholar 

  16. Benger, N., Pol, J., Smart, N.P., Yarom, Y.: Ooh Aah.. Just a Little Bit: a small amount of side channel can go a long way. In: Batina, L., Robshaw, M. (eds.) CHES 2014. LNCS, vol. 8731, pp. 75–92. Springer, Heidelberg (2014). doi:10.1007/978-3-662-44709-3_5

    Google Scholar 

  17. Yarom, Y., Benger, N.: Recovering OPENSSL ECDSA nonces using the flush+ reload cache side-channel attack. IACR Cryptol. ePrint Arch. 2014, 140 (2014)

    Google Scholar 

  18. Bruinderink, L.G., Hülsing, A., Lange, T., Yarom, Y.: Flush, gauss, and reload-a cache attack on the bliss lattice-based signature scheme. Exchange 6(18), 24 (2016)

    Google Scholar 

  19. Gruss, D., Maurice, C., Wagner, K., Mangard, S.: Flush+ flush: a fast and stealthy cache attack. arXiv preprint arXiv:1511.04594 (2015)

  20. Gruss, D., Spreitzer, R., Mangard, S.: Cache template attacks: automating attacks on inclusive last-level caches. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 897–912 (2015)

    Google Scholar 

  21. Irazoqui, G., Inci, M.S., Eisenbarth, T., Sunar, B.: Wait a minute! a fast, cross-VM attack on AES. In: Stavrou, A., Bos, H., Portokalidis, G. (eds.) RAID 2014. LNCS, vol. 8688, pp. 299–319. Springer, Cham (2014). doi:10.1007/978-3-319-11379-1_15

    Google Scholar 

  22. Zhang, X., Xiao, Y., Zhang, Y.: Return-oriented flush-reload side channels on arm and their implications for android devices. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 858–870, ACM (2016)

    Google Scholar 

  23. Domnitser, L., Jaleel, A., Loew, J., Abu-Ghazaleh, N., Ponomarev, D.: Non-monopolizable caches: low-complexity mitigation of cache side channel attacks. ACM Trans. Architecture Code Optim. (TACO) 8(4), 35 (2012)

    Google Scholar 

  24. Liu, F., Ge, Q., Yarom, Y., Mckeen, F., Rozas, C., Heiser, G., Lee, R.B.: Catalyst: defeating last-level cache side channel attacks in cloud computing. In: 2016 IEEE International Symposium on High Performance Computer Architecture (HPCA), pp. 406–418. IEEE (2016)

    Google Scholar 

  25. Wang, Z., Lee, R.B.: New cache designs for thwarting software cache-based side channel attacks. In: ACM SIGARCH Computer Architecture News, vol. 35, pp. 494–505. ACM (2007)

    Google Scholar 

  26. Kim, T., Peinado, M., Mainar-Ruiz, G.: Stealthmem: system-level protection against cache-based side channel attacks in the cloud. In: Presented as Part of the 21st USENIX Security Symposium (USENIX Security 12), pp. 189–204 (2012)

    Google Scholar 

  27. Shi, J., Song, X., Chen, H., Zang, B.: Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring. In: 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp. 194–199. IEEE (2011)

    Google Scholar 

  28. Liu, F., Lee, R.B.: Random fill cache architecture. In: 2014 47th Annual IEEE/ACM International Symposium on Microarchitecture, pp. 203–215. IEEE (2014)

    Google Scholar 

  29. Wang, Z., Lee, R.B.: A novel cache architecture with enhanced performance and security. In: 2008 41st IEEE/ACM International Symposium on Microarchitecture, pp. 83–93. IEEE (2008)

    Google Scholar 

Download references

Acknowledgement

This paper was supported by National Natural Science Foundation of China (NSFC) under Grant No. 61100228 and the project Core Electronic Devices, High-end Generic Chips and Basic Software (No. 2015ZX01029101-001).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoqi Jia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Zhang, W., Jia, X., Tai, J., Wang, M. (2017). CacheRascal: Defending the Flush-Reload Side-Channel Attack in PaaS Clouds. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds) Wireless Algorithms, Systems, and Applications. WASA 2017. Lecture Notes in Computer Science(), vol 10251. Springer, Cham. https://doi.org/10.1007/978-3-319-60033-8_57

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60033-8_57

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60032-1

  • Online ISBN: 978-3-319-60033-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics