题名 | CIPHERLEAKS: Breaking constant-time cryptography on AMD SEV via the ciphertext side channel |
作者 | |
通讯作者 | Zhang,Yinqian |
发表日期 | 2021
|
会议名称 | USENIX Security Symposium
|
会议录名称 | |
页码 | 717-732
|
会议日期 | August 11–13, 2021
|
会议地点 | 线上
|
摘要 | AMD's Secure Encrypted Virtualization (SEV) is a hardware extension available in AMD's EPYC server processors to support confidential cloud computing. While various prior studies have demonstrated attacks against SEV by exploiting its lack of encryption in the VM control block or the lack of integrity protection of the encrypted memory and nested page tables, these issues have been addressed in the subsequent releases of SEV-Encrypted State (SEV-ES) and SEV-Secure Nested Paging (SEV-SNP). In this paper, we study a previously unexplored vulnerability of SEV, including both SEV-ES and SEV-SNP. The vulnerability is dubbed ciphertext side channels, which allows the privileged adversary to infer the guest VM's execution states or recover certain plaintext. To demonstrate the severity of the vulnerability, we present the CIPHERLEAKS attack, which exploits the ciphertext side channel to steal private keys from the constant-time implementation of the RSA and the ECDSA in the latest OpenSSL library. |
学校署名 | 通讯
|
语种 | 英语
|
相关链接 | [Scopus记录] |
收录类别 | |
EI入藏号 | 20213710882190
|
EI主题词 | Security of data
; Virtual machine
|
EI分类号 | Data Processing and Image Processing:723.2
|
Scopus记录号 | 2-s2.0-85114506163
|
来源库 | Scopus
|
成果类型 | 会议论文 |
条目标识符 | http://sustech.caswiz.com/handle/2SGJ60CL/254539 |
专题 | 工学院_计算机科学与工程系 |
作者单位 | 1.The Ohio State University,United States 2.Southern University of Science and Technology,China 3.Baidu Security,China 4.NIO Security Research,China |
通讯作者单位 | 南方科技大学 |
推荐引用方式 GB/T 7714 |
Li,Mengyuan,Zhang,Yinqian,Wang,Huibo,et al. CIPHERLEAKS: Breaking constant-time cryptography on AMD SEV via the ciphertext side channel[C],2021:717-732.
|
条目包含的文件 | ||||||
文件名称/大小 | 文献类型 | 版本类型 | 开放类型 | 使用许可 | 操作 | |
CipherLeaks.pdf(681KB) | -- | -- | 限制开放 | -- |
|
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论