Know Thy Neighbor: Crypto Library Detection in Cloud

Thomas Eisenbarth, Gorka Irazoqui, Mehmet Sinan Inci, Berk Sunar

Abstract

Software updates and security patches have become a standard method to fix known and recently discovered security vulnerabilities in deployed software. In server applications, outdated cryptographic libraries allow adversaries to exploit weaknesses and launch attacks with significant security results. The proposed technique exploits leakages at the hardware level to first, determine if a specific cryptographic library is running inside (or not) a co-located virtual machine (VM) and second to discover the IP of the co-located target. To this end, we use a Flush+Reload cache side-channel technique to measure the time it takes to call (load) a cryptographic library function. Shorter loading times are indicative of the library already residing in memory and shared by the VM manager through deduplication. We demonstrate the viability of the proposed technique by detecting and distinguishing various cryptographic libraries, including MatrixSSL, PolarSSL, GnuTLS, OpenSSL and CyaSSL along with the IP of the VM running these libraries. In addition, we show how to differentiate between various versions of libraries to better select an attack target as well as the applicable exploit. Our experiments show a complete attack setup scenario with single-trial success rates of up to 90% under light load and up to 50% under heavy load for libraries running in KVM.
Original languageEnglish
JournalProceedings on Privacy Enhancing Technologies
Volume2015
Issue number1
Pages (from-to)25-40
Number of pages16
ISSN2299-0984
DOIs
Publication statusPublished - 18.04.2015

Fingerprint

Dive into the research topics of 'Know Thy Neighbor: Crypto Library Detection in Cloud'. Together they form a unique fingerprint.

Cite this