Frequency Throttling Side-Channel Attack

06/14/2022
by   Chen Liu, et al.
0

Modern processors dynamically control their operating frequency to optimize resource utilization, maximize energy savings, and to conform to system-defined constraints. If, during the execution of a software workload, the running average of any electrical or thermal parameter exceeds its corresponding predefined threshold value, the power management architecture will reactively adjust CPU frequency to ensure safe operating conditions. In this paper, we demonstrate how such power management-based CPU throttling activity forms a source of timing side-channel information leakage, which can be exploited by an attacker to infer secret data from a constant-cycle victim workload. We highlight the fact that a constant-cycle implementation of code does not necessarily guarantee its constant execution on different data inputs with respect to wall clock time. This is because existing throttling mechanisms perform data-dependent frequency adjustments, which in turn make the running time of the code also data-dependent. The proposed frequency throttling side-channel analysis attack can be launched by kernel-space attackers and user-space attackers, thus compromising security guarantees provided by isolation boundaries. We validate our attack methodology across different systems by performing experiments on a constant-cycle implementation of the AES-128 algorithm. The results of our experimental evaluations demonstrate how the attacker can successfully recover the targeted AES key by correlating the collected timing side-channel traces with the corresponding timing estimates for different key guesses, under frequency throttling. Finally, we discuss different options to mitigate the threat posed by frequency throttling side-channel attacks, as well as their advantages and disadvantages.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/21/2023

Timing the Transient Execution: A New Side-Channel Attack on Intel CPUs

The transient execution attack is a type of attack leveraging the vulner...
research
09/21/2023

DeepTheft: Stealing DNN Model Architectures through Power Side Channel

Deep Neural Network (DNN) models are often deployed in resource-sharing ...
research
03/23/2022

TPPD: Targeted Pseudo Partitioning based Defence for Cross-Core Covert Channel Attacks

Contemporary computing employs cache hierarchy to fill the speed gap bet...
research
04/27/2015

Deterministically Deterring Timing Attacks in Deterland

The massive parallelism and resource sharing embodying today's cloud bus...
research
06/13/2018

SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation

Speculative execution which is used pervasively in modern CPUs can leave...
research
06/27/2022

DF-SCA: Dynamic Frequency Side Channel Attacks are Practical

The arm race between hardware security engineers and side-channel resear...
research
09/16/2020

SideLine: How Delay-Lines (May) Leak Secrets from your SoC

To meet the ever-growing need for performance in silicon devices, SoC pr...

Please sign up or login with your details

Forgot password? Click here to reset