【24h】

A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service

机译:基础设施即服务中微体系结构隐蔽通道漏洞研究

获取原文

摘要

Microarchitectural cross-VM covert channels are software-launched attacks which exploit multi-tenant environments' shared hardware. They enable transmitting information from a compromised system when the information flow policy does not allow to do so. These attacks represent a threat to the confidentiality and integrity of data processed and stored on cloud platforms. Although potentially severe, covert channels tend to be overlooked due to an allegedly strong adversary model. The literature focuses on mechanisms for encoding information through timing variations, without addressing practical considerations. Furthermore, the field lacks a realistic evaluation framework. Covert channels are usually compared to each other using the channel capacity. While a valuable performance metric, the capacity is inadequate to assess the severity of an attack. In this paper, we conduct a comprehensive study on the severity of microarchitectural covert channels in public clouds. State-of-the-art attacks are evaluated against the Common Vulnerability Scoring System in its most recent version (CVSS v3.1). The study shows that a medium severity score of 5.0 is achieved. In comparison, the SSLv3 POODLE (CVE-2014-3566) and OpenSSL Heartbleed (CVE-2014-0160) vulnerabilities achieved respective scores of 3.1 and 7.5. As such, the paper successfully demonstrates that covert channels are not theoretical threats, and that they require the immediate attention of the community. Furthermore, we devise a new and independent scoring system, the Covert Channel Scoring System (CCSS). The scoring of related works under the CCSS shows that cache-based covert channels, although more and more popular, are the least practical ones to deploy. We encourage authors of future cross-VM covert channel attacks to include a CCSS metric in their study, in order to account for deployment constraints and provide a fair point of comparison for the adversary model.
机译:微体系结构跨VM隐蔽通道是利用多租户环境共享硬件的软件发起的攻击。当信息流策略不允许时,它们可以从受损系统传输信息。这些攻击对云平台上处理和存储的数据的机密性和完整性构成威胁。尽管潜在的严重性,但由于据称强大的对手模式,隐蔽渠道往往被忽视。文献主要关注通过时间变化对信息进行编码的机制,而没有涉及实际考虑。此外,该领域缺乏现实的评估框架。隐蔽通道通常使用通道容量相互比较。虽然这是一个有价值的性能指标,但容量不足以评估攻击的严重性。在本文中,我们对公共云中微体系结构隐蔽通道的严重性进行了全面的研究。最新版本(CVSS v3.1)中的通用漏洞评分系统对最先进的攻击进行了评估。研究表明,中度严重程度得分为5.0。相比之下,SSLv3贵宾犬(CVE-2014-3566)和OpenSSL Heartbleed(CVE-2014-0160)漏洞的得分分别为3.1和7.5。因此,这篇论文成功地证明了秘密渠道不是理论上的威胁,它们需要社区的立即关注。此外,我们还设计了一个新的、独立的评分系统,即隐蔽通道评分系统(CCSS)。CCSS下相关工作的评分显示,基于缓存的隐蔽通道虽然越来越流行,但最不实用。我们鼓励未来跨VM隐蔽通道攻击的作者在他们的研究中包括CCSS指标,以便考虑部署限制,并为对手模型提供公平的比较点。

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号