TY - JOUR
T1 - Cross-VM Cache Attacks on AES
AU - Gulmezoglu, Berk
AU - Inci, Mehmet Sinan
AU - Irazoqui, Gorka
AU - Eisenbarth, Thomas
AU - Sunar, Berk
PY - 2016/4/5
Y1 - 2016/4/5
N2 - Cache based attacks can overcome software-level isolation techniques to recover cryptographic keys across VMboundaries. Therefore, cache attacks are believed to pose a serious threat to public clouds. In this work, we investigate the effectiveness of cache attacks in such scenarios. Specifically, we apply the Flush+Reload and Prime+Probe methods to mount cache side-channel attacks on a popular OpenSSL implementation of AES. The attacks work across cores in the cross-VM setting and succeeds to recover the full encryption keys in a short time-suggesting a practical threat to real-life systems. Our results show that there is strong information leakage through cache in virtualized systems and the software implementations of AES must be approached with caution. Indeed, for the first time, we demonstrate the effectiveness of the attack across co-located instances on the Amazon EC2 cloud. We argue that for secure usage of world's most commonly used block cipher such as AES, one should rely on secure, constanttime hardware implementations offered by CPU vendors.
AB - Cache based attacks can overcome software-level isolation techniques to recover cryptographic keys across VMboundaries. Therefore, cache attacks are believed to pose a serious threat to public clouds. In this work, we investigate the effectiveness of cache attacks in such scenarios. Specifically, we apply the Flush+Reload and Prime+Probe methods to mount cache side-channel attacks on a popular OpenSSL implementation of AES. The attacks work across cores in the cross-VM setting and succeeds to recover the full encryption keys in a short time-suggesting a practical threat to real-life systems. Our results show that there is strong information leakage through cache in virtualized systems and the software implementations of AES must be approached with caution. Indeed, for the first time, we demonstrate the effectiveness of the attack across co-located instances on the Amazon EC2 cloud. We argue that for secure usage of world's most commonly used block cipher such as AES, one should rely on secure, constanttime hardware implementations offered by CPU vendors.
UR - https://www.semanticscholar.org/paper/Cross-VM-Cache-Attacks-on-AES-G%C3%BClmezoglu-Inci/123bb0f9148cce072fb33a828e93856a62bfeef3
U2 - 10.1109/TMSCS.2016.2550438
DO - 10.1109/TMSCS.2016.2550438
M3 - Journal articles
SN - 2332-7766
VL - 2
SP - 211
EP - 222
JO - IEEE Transactions on Multi-Scale Computing Systems
JF - IEEE Transactions on Multi-Scale Computing Systems
IS - 3
ER -