HyperDegrade: From GHz to MHz Effective CPU Frequencies

01/04/2021
by   Alejandro Cabrera Aldaya, et al.
0

Performance degradation techniques are an important complement to side-channel attacks. In this work, we propose HyperDegrade – a combination of previous approaches and the use of simultaneous multithreading (SMT) architectures. In addition to the new technique, we investigate the root causes of performance degradation using cache eviction, discovering a previously unknown slowdown origin. The slowdown produced is significantly higher than previous approaches, which translates into an increased time granularity for Flush+Reload attacks. We evaluate HyperDegrade on different Intel microarchitectures, yielding significant slowdowns that achieve, in some cases, three orders of magnitude improvement over state-of-the-art. To evaluate the efficacy of performance degradation in side-channel amplification, we propose and evaluate leakage assessment metrics. The results evidence that HyperDegrade increases time granularity without a meaningful impact on trace quality. Additionally, we designed a fair experiment that compares three performance degradation strategies when coupled with Flush+Reload from a practical perspective. We developed an attack on an unexploited vulnerability in OpenSSL in which HyperDegrade excels – reducing by three times the number of required Flush+Reload traces to succeed. Regarding cryptography contributions, we revisit the recently proposed Raccoon attack on TLS-DH key exchanges, demonstrating its application to other protocols beyond legacy TLS cipher suites. Using HyperDegrade we developed an end-to-end attack that shows how a Raccoon-like attack can succeed in practice, filling a missing gap from previous research.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset
Success!
Error Icon An error occurred

Sign in with Google

×

Use your Google Account to sign in to DeepAI

×

Consider DeepAI Pro