中文版 | English
题名

PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on AMD SEV

作者
通讯作者Lin,Zhiqiang
DOI
发表日期
2023
ISSN
0302-9743
EISSN
1611-3349
会议录名称
卷号
13959 LNCS
页码
46-66
摘要
An increasing number of Trusted Execution Environment (TEE) is adopting to a variety of commercial products for protecting data security on the cloud. However, TEEs are still exposed to various side-channel vulnerabilities, such as execution order-based, timing-based, and power-based vulnerabilities. While recent hardware is applying various techniques to mitigate order-based and timing-based side-channel vulnerabilities, power-based side-channel attacks remain a concern of hardware security, especially for the confidential computing settings where the server machines are beyond the control of cloud users. In this paper, we present PwrLeak, an attack framework that exploits AMD’s power reporting interfaces to build power side-channel attacks against AMD Secure Encrypted Virtualization (SEV)-protected VM. We design and implement the attack framework with three general steps: (1) identify the instruction running inside AMD SEV, (2) apply a power interpolator to amplify power consumption, including an emulation-based interpolator for analyzing purposes and a more general interrupt-based interpolator, and (3) infer secrets with various analysis approaches. A case study of using the emulation-based interpolator to infer the whole JPEG images processed by libjpeg demonstrates its ability to help analyze power consumption inside SEV VM. Our end-to-end attacks against Intel’s Integrated Performance Primitives (Intel IPP) library indicates that PwrLeak can be exploited to infer RSA private keys with over 80% accuracy using the interrupt-based interpolator.
学校署名
其他
语种
英语
相关链接[Scopus记录]
收录类别
EI入藏号
20232814377876
EI主题词
Computer hardware ; Electric power utilization ; Hardware security ; Interpolation
EI分类号
Electric Power Systems:706.1 ; Computer Systems and Equipment:722 ; Numerical Methods:921.6
Scopus记录号
2-s2.0-85164251302
来源库
Scopus
引用统计
被引频次[WOS]:0
成果类型会议论文
条目标识符http://sustech.caswiz.com/handle/2SGJ60CL/560246
专题南方科技大学
作者单位
1.The Ohio State University,Columbus,43210,United States
2.Southern University of Science and Technology,Shenzhen,Guangdong,518055,China
推荐引用方式
GB/T 7714
Wang,Wubing,Li,Mengyuan,Zhang,Yinqian,et al. PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on AMD SEV[C],2023:46-66.
条目包含的文件
条目无相关文件。
个性服务
原文链接
推荐该条目
保存到收藏夹
查看访问统计
导出为Endnote文件
导出为Excel格式
导出为Csv格式
Altmetrics Score
谷歌学术
谷歌学术中相似的文章
[Wang,Wubing]的文章
[Li,Mengyuan]的文章
[Zhang,Yinqian]的文章
百度学术
百度学术中相似的文章
[Wang,Wubing]的文章
[Li,Mengyuan]的文章
[Zhang,Yinqian]的文章
必应学术
必应学术中相似的文章
[Wang,Wubing]的文章
[Li,Mengyuan]的文章
[Zhang,Yinqian]的文章
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
[发表评论/异议/意见]
暂无评论

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。