首页> 外文期刊>IEEE transactions on dependable and secure computing >Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory
【24h】

Mimosa: Protecting Private Keys Against Memory Disclosure Attacks Using Hardware Transactional Memory

机译:MIMOSA:使用硬件事务内存保护私钥免受记忆泄露攻击

获取原文
获取原文并翻译 | 示例

摘要

Cryptography is essential for computer and network security. When cryptosystems are deployed in computing or communication systems, it is extremely critical to protect the cryptographic keys. In practice, keys are loaded into the memory as plaintext during cryptographic computations. Therefore, the keys are subject to memory disclosure attacks that read unauthorized data from RAM. Such attacks could be performed through software exploitations, such as OpenSSL Heartbleed, even when the integrity of the victim system's binaries is maintained. They could also be done through physical methods, such as cold-boot attacks, even if the system is free of software vulnerabilities. This paper presents Mimosa, to protect RSA private keys against both software-based and physical memory disclosure attacks. Mimosa uses hardware transactional memory (HTM) to ensure that (a) whenever a malicious thread other than Mimosa attempts to read the plaintext private key, the transaction aborts and all sensitive data are automatically cleared with hardware, due to the strong atomicity guarantee of HTM; and (b) all sensitive data, including private keys and intermediate states, appear as plaintext only within CPU-bound caches, and are never loaded to RAM chips. To the best of our knowledge, Mimosa is the first solution to use transactional memory to protect sensitive data against memory attacks. However, the fragility of TSX transactions introduces extra cache-clogging denial-of-service (DoS) threats, and attackers could sharply degrade the performance by concurrent memory-intensive tasks. To mitigate the DoS threats, we further partition an RSA private-key computation into multiple transactional parts by analyzing the distribution of aborts, while (sensitive) intermediate results are still protected across transactional parts. Through extensive experiments, we show that Mimosa effectively protects cryptographic keys against attacks that attempt to read sensitive data in memory, and introduces only a small performance overhead, even with concurrent cache-clogging workloads.
机译:加密对于计算机和网络安全至关重要。当密码系统部署在计算或通信系统中时,保护加密密钥非常重要。在实践中,密钥在加密计算期间将键作为明文加载到存储器中。因此,密钥受到从RAM读取未授权数据的存储器泄露攻击。即使在维持受害者系统的二进制文件的完整性,也可以通过软件利用,例如openssl exceplyed来执行这些攻击。它们还可以通过物理方法来完成,例如冷启动攻击,即使系统没有软件漏洞。本文介绍了MIMOSA,以保护RSA私钥对基于软件和物理内存泄露攻击。 Mimosa使用硬件事务内存(HTM)确保(a)只要Mimosa以外的恶意线程尝试阅读明文私钥,由于HTM的强烈的原子性保证,事务中止和所有敏感数据都会自动清除。 ; (b)所有敏感数据,包括私钥和中间状态,才会在CPU绑定的缓存中显示为明文,并且永远不会加载到RAM芯片。据我们所知,MIMOSA是第一个使用事务内存来保护敏感数据免受内存攻击的解决方案。但是,TSX交易的碎片介绍了额外的缓存堵塞拒绝服务(DOS)威胁,攻击者可以通过并发内存密集型任务急剧降低性能。为了缓解DOS威胁,我们将通过分析中止的分布,进一步将RSA私钥计算分为多个事务性部件,而(敏感)中间结果仍然受到在事务部件的影响。通过广泛的实验,我们表明Mimosa有效地保护加密密钥免受尝试在内存中读取敏感数据的攻击,并且即使使用并发缓存堵塞工作负载也是小的性能开销。

著录项

  • 来源
  • 作者单位

    Chinese Acad Sci State Key Lab Informat Secur Inst Informat Engn Beijing Peoples R China|Chinese Acad Sci Data Assurance & Commun Secur Ctr Beijing Peoples R China;

    Chinese Acad Sci State Key Lab Informat Secur Inst Informat Engn Beijing Peoples R China|Chinese Acad Sci Data Assurance & Commun Secur Ctr Beijing Peoples R China|Univ Georgia Dept Comp Sci Athens GA 30602 USA;

    Chinese Acad Sci State Key Lab Informat Secur Inst Informat Engn Beijing Peoples R China|Chinese Acad Sci Data Assurance & Commun Secur Ctr Beijing Peoples R China;

    Univ Kansas Dept Elect Engn & Comp Sci Lawrence KS 66045 USA;

    Chinese Acad Sci State Key Lab Informat Secur Inst Informat Engn Beijing Peoples R China|Chinese Acad Sci Data Assurance & Commun Secur Ctr Beijing Peoples R China;

    Chinese Acad Sci State Key Lab Informat Secur Inst Informat Engn Beijing Peoples R China|Chinese Acad Sci Data Assurance & Commun Secur Ctr Beijing Peoples R China;

    Chinese Acad Sci State Key Lab Informat Secur Inst Informat Engn Beijing Peoples R China|Chinese Acad Sci Data Assurance & Commun Secur Ctr Beijing Peoples R China;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Random access memory; Cryptography; Registers; Kernel; Hardware; Cold-boot attack; CPU-bound encryption; DMA attack; memory disclosure attack; transactional memory;

    机译:随机存取内存;加密;寄存器;内核;硬件;冷启动攻击;CPU绑定加密;DMA攻击;记忆泄露攻击;交易记忆;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号